Sample questions
Q1. Which one of the following is not a mandatory access control?
- Rule-based access control
- Role-based access control
- Lattice based access control
- Discretionary access control
Q2. If access to an object is controlled based on parameters such as location, time, and so on, then this type of access control is known as what?
- Content-dependent access control
- Context-dependent access control
- Character-dependent access control
- Class-dependent access control
Q3. Which one of the following is also called as a logic bomb?
- Spoofing
- Trojan horse getting activated on an event
- Vulnerability exploitation by an attacker
- Virus
Q4. Dictionary attack is a type of?
- Denial-of-Service attack
- Spoofing
- Password guessing attack
- Social engineering
Q5. Basic functionality of the malicious code is to_______.
- Upgrade the operating system
- Execute itself in the client system
- Spoof
- Denial-of-Service
Q6. CAPTCHA is one of the popular mechanisms used by websites to control input to the access control system is supplied by humans...