Mock test
Q1. An attack that compromises the information stored in the client machine by web browsers for faster retrieval during subsequent visits is called what?
- Path traversal
- Data structure attacks
- Eavesdropping
- Cache poisoning
Q2. Which of the following are risk management processes? (This is a drag-and-drop type of question. Here, and for similar drag-and-drop questions, you can draw a line from the list of answers from the left to the empty box on the right.)
Q3. Primary criterion of a Business continuity planning is to ensure that the scoping is _____.
- Adequate
- Large
- Appropriate
- Wide coverage
Q4. What is the algorithm used by the Wi-Fi Protected Access 2 (WPA2) protocol for encryption?
- RC4
- Data Encryption Algorithm (DES)
- Advanced Encryption Algorithm (AES)
- Triple-DES
Q5. Measurements help in reducing the frequency and severity of security-related issues. Which one of the following is not a right choice for measurements?
- Expectations from data privacy requirements
- Reduction in number of incidents
- More...