CMB icon images CHAPTER 5 ASSESSMENT

  1. Identifying the demographics of the visitors to a website is important to which of the following? Choose all that apply.

    1. Help create a focus for the site based on visitor need
    2. Create a design suited for the specific group demographics
    3. Pinpoint characteristics of the ideal visitor and customer
    4. Identify the geographical area with the highest number of ideal customers
    5. A, C, and D
    6. B and D
    7. A and C
    8. All options apply.
  2. Which one of the following is not included in the currently published OWASP Top 10 Threats list?

    1. Broken access control
    2. Cryptographic failures
    3. Biometric scanner failures
    4. Insecure design
    5. Identification and authentication failures
  3. Older hardware and software components on a computer system may have vulnerabilities that once were not considered as such.

    1. True
    2. False
  4. Authorization validates the person requesting access is presenting correct and valid credentials.

    1. True
    2. False
  5. 2FA is a limited version of which one of the following?

    1. SFA
    2. MFA
    3. FFA
    4. SSO
  6. Which one of the following is considered to be a primary mitigation for identification and authentication vulnerabilities?

    1. Strong passwords
    2. Passwords that do not expire
    3. Common language passwords
    4. Passwords with six or more characters
  7. Every incoming or outgoing data transfer, user login, and edge security device action should be considered a security event.

    1. True
    2. False
  8. What is the security method that applies security measures in layers?

    1. IPSec
    2. Defense in depth
    3. Authentication
    4. Access control lists
  9. Which of the following organizations publishes the Top 10 Web Application Security Risks?

    1. OWASP
    2. CVE
  10. What is the security method that applies defensive security measures in layers?

    1. SSRF
    2. DiD
    3. IPSEC
    4. MFA
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset