General Security Concepts | Test-5

0%
0

General Security Concepts | Test-5

This section focuses on evaluating foundational security practices and principles across the entire system. Tests include assessing the applicationโ€™s adherence to the CIA triad (Confidentiality, Integrity, and Availability), evaluating security policies, and verifying compliance with industry standards and regulations. It also covers risk management processes, incident response readiness, data classification, and the use of secure development frameworks. Additionally, this section examines overall security awareness and the applicationโ€™s resilience to common threats such as malware, insider threats, and social engineering attacks.

1 / 15

1. Which of the following is not a threat agent?

2 / 15

2. Replacingย  a software with known vulnerabilities with a newer version is an example of risk:

3 / 15

3. Testing for the randomness of session identifiers and the presence of auditing capabilities ensures presence of the following security control?

4 / 15

4. __________ is a structured and iterative forecasting or decision-making method that involves gathering input from a group of experts anonymously and then using a facilitator to present a summary of their opinions for further feedback. The process continues until a consensus or convergence of opinions is reached.

5 / 15

5. __________ is a systematic method for analyzing and visually representing the potential causes of a specific undesirable event or system failure. It uses a tree-like structure to break down complex events into contributing factors, helping identify the root causes and pathways that lead to the undesired outcome. It is commonly used in risk assessment and safety engineering to understand and mitigate the factors that can lead to failures or accidents.

6 / 15

6. Which of the following software licenses types restrict reverse-engineering?

7 / 15

7. What is Two-man control or four-eyes principle?

8 / 15

8. ________ is an undocumented access path through a system. This typically bypasses the normal security mechanisms and is to plant any of the malicious code forms

9 / 15

9. Which of the following is NOT the job of the data custodian?

10 / 15

10. What is the formula for Total Risk?

11 / 15

11. You received an email from Bill, your senior manager, about a deal with one of the clients. You comply with the request to accept the offer. After a week, Bill disputes ever having sent a letter. What kind of security measure do you need to “prove” that Bill was the one who sent the email?

12 / 15

12. Which of the following best describes the core principle of the Zero Trust security model?

13 / 15

13. Is true quantitative risk analysis possible to achieve?

14 / 15

14. Which phrase among the following BEST sums up the level of risk that persists after vulnerabilities are identified and countermeasures are implemented?

15 / 15

15. A tool used to communicate and enforce organizational and management goals and objectives at a high level is a known as:

Your score is

The average score is 0%

0%


Related challenges :