Q1. An interface test is done to ascertain:
- Pressure, temperature, and environment conditions
- Metrics for code coverage
- The round-trip time of a request response
- Security during interactions between user to interfaces and interface to modules
Q2. Identity management includes:
- The enrollment of user identifiers
- The provisioning or deprovisioning of user identities to different systems
- Whenever there is a change in user information then updating all associated accounts
- All of the above
Q3. When an identified vulnerability is not published by the application vendor then it is called:
- Zero-day vulnerability
- Zero-day exploit
- Zero-day logic bomb
- Zero-day threat
Q4. Which one of the following is not a password attack?
- Dictionary attack
- Brute force attack
- Code attack
- Hybrid attack
Q5. The reverse of a use case test is a:
- Vulnerability case test
- Penetration case test
- Nonuse case test
- Misuse case test
Q6. A person, process, or technology component that either seeks access or controls the access is called:
Q7. Synthetic transactions are generally used for:
- Performance monitoring and directly associated with the availability tenet
- Performance monitoring and directly associated with the confidentiality tenet
- Performance monitoring and directly associated with the integrity tenet
- Performance monitoring and directly associated with authentication
Q8. Imitating a trusted entity, thereby making the system trust this imitated entity, is known as:
- Scanning
- Sniffing
- Spoofing
- Monitoring
Q9. Identify the true statements pertaining to access control from the following (this is a drag-and-drop type of question. Here, and for similar drag-and-drop questions, you can draw a line from the list of answers from the left to the empty box on the right).
Q10. Which one of the following choices in an audit trail that is unlikely to be contained in the access log file pertaining to physical access?
- Access attempts
- Access results such as success or failure
- Locations accessed
- Access control list