Ethical behavior in software testing
26 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which statement BEST describes the behavior of the engineer who created the virus creation tool?

  • The behavior is ethical because the tool will be used to create a better virus scanner. (correct)
  • The behavior is not ethical because creating any kind of virus is bad.
  • The behavior is not ethical because such a tool could be leaked on the Internet.
  • The behavior is ethical because any experienced programmer could create such a tool.
  • Which technology effectively obscures network addresses from external exposure when implemented on a firewall or router?

  • Address Masking
  • Network Address Translation (NAT) (correct)
  • Routing Information Protocol (RIP) Version 2
  • Application Proxy
  • In a non-climate controlled environment, what should Passive Infrared Sensors (PIR) do?

  • Automatically compensate for variance in background temperature. (correct)
  • Detect objects of a specific temperature independent of the background temperature.
  • Reduce the detected object temperature in relation to the background temperature.
  • Increase the detected object temperature in relation to the background temperature.
  • What is a federated identity standard?

    <p>Security Assertion Markup Language (SAML)</p> Signup and view all the answers

    What is the main influence on designing an organization's electronic monitoring policies?

    <p>Workplace privacy laws</p> Signup and view all the answers

    For configuring a Domain Name Service (DNS) system, what is a best practice from a security perspective?

    <p>Limit zone transfers to authorized devices</p> Signup and view all the answers

    What is the primary basis for application access in a large organization according to the given information?

    <p>Job classification</p> Signup and view all the answers

    Which option is NOT recommended for configuring a DNS system securely?

    <p>Allow unlimited zone transfers</p> Signup and view all the answers

    What technology is used by the large organization for access control based on the provided information?

    <p>Kerberos</p> Signup and view all the answers

    What is an attacker MOST likely to target to gain privileged access to a system?

    <p>Programs that write to system resources</p> Signup and view all the answers

    Which is the MOST effective countermeasure to a malicious code attack against a mobile system?

    <p>Sandbox</p> Signup and view all the answers

    What transmission media is MOST effective in preventing data interception?

    <p>Fiber optic</p> Signup and view all the answers

    Which factor increases the level of vulnerability to physical threats when building a data center?

    <p>Proximity to high crime areas of the city</p> Signup and view all the answers

    What does the Encapsulating Security Payload (ESP) provide?

    <p>Confidentiality and integrity</p> Signup and view all the answers

    Which type of construction factor can increase the security level of a data center?

    <p>Use of biometric access control systems</p> Signup and view all the answers

    What is a recommended measure for enhancing security during a user session?

    <p>Re-authentication periodically</p> Signup and view all the answers

    Why might a customer transaction be kept beyond the retention schedule?

    <p>Pending legal hold</p> Signup and view all the answers

    What type of security control is exemplified by using a proximity card to access a building?

    <p>Physical</p> Signup and view all the answers

    What is the most effective method for preventing e-mail spoofing?

    <p>Cryptographic signature</p> Signup and view all the answers

    Why would a security practitioner need a plan to address client-based attacks?

    <p>Existing network vulnerabilities</p> Signup and view all the answers

    Which principle requires that changes to the plaintext affect many parts of the ciphertext?

    <p>Diffusion</p> Signup and view all the answers

    In terms of information classification, what should be the first step in the process?

    <p>Conducting a data inventory</p> Signup and view all the answers

    What is the primary purpose of testing a Disaster Recovery Plan (DRP)?

    <p>Validating the effectiveness of the plan</p> Signup and view all the answers

    When computer personnel are terminated, what should be the FIRST security action taken?

    <p>Remove their computer access</p> Signup and view all the answers

    When should re-authentication be required in a user session according to best practices?

    <p>After a period of inactivity</p> Signup and view all the answers

    Which type of control recognizes excessive transaction amounts according to corporate policy?

    <p>Detection</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser