Ethical behavior in software testing

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which statement BEST describes the behavior of the engineer who created the virus creation tool?

  • The behavior is ethical because the tool will be used to create a better virus scanner. (correct)
  • The behavior is not ethical because creating any kind of virus is bad.
  • The behavior is not ethical because such a tool could be leaked on the Internet.
  • The behavior is ethical because any experienced programmer could create such a tool.

Which technology effectively obscures network addresses from external exposure when implemented on a firewall or router?

  • Address Masking
  • Network Address Translation (NAT) (correct)
  • Routing Information Protocol (RIP) Version 2
  • Application Proxy

In a non-climate controlled environment, what should Passive Infrared Sensors (PIR) do?

  • Automatically compensate for variance in background temperature. (correct)
  • Detect objects of a specific temperature independent of the background temperature.
  • Reduce the detected object temperature in relation to the background temperature.
  • Increase the detected object temperature in relation to the background temperature.

What is a federated identity standard?

<p>Security Assertion Markup Language (SAML) (D)</p> Signup and view all the answers

What is the main influence on designing an organization's electronic monitoring policies?

<p>Workplace privacy laws (C)</p> Signup and view all the answers

For configuring a Domain Name Service (DNS) system, what is a best practice from a security perspective?

<p>Limit zone transfers to authorized devices (A)</p> Signup and view all the answers

What is the primary basis for application access in a large organization according to the given information?

<p>Job classification (B)</p> Signup and view all the answers

Which option is NOT recommended for configuring a DNS system securely?

<p>Allow unlimited zone transfers (A)</p> Signup and view all the answers

What technology is used by the large organization for access control based on the provided information?

<p>Kerberos (C)</p> Signup and view all the answers

What is an attacker MOST likely to target to gain privileged access to a system?

<p>Programs that write to system resources (D)</p> Signup and view all the answers

Which is the MOST effective countermeasure to a malicious code attack against a mobile system?

<p>Sandbox (D)</p> Signup and view all the answers

What transmission media is MOST effective in preventing data interception?

<p>Fiber optic (A)</p> Signup and view all the answers

Which factor increases the level of vulnerability to physical threats when building a data center?

<p>Proximity to high crime areas of the city (B)</p> Signup and view all the answers

What does the Encapsulating Security Payload (ESP) provide?

<p>Confidentiality and integrity (D)</p> Signup and view all the answers

Which type of construction factor can increase the security level of a data center?

<p>Use of biometric access control systems (A)</p> Signup and view all the answers

What is a recommended measure for enhancing security during a user session?

<p>Re-authentication periodically (C)</p> Signup and view all the answers

Why might a customer transaction be kept beyond the retention schedule?

<p>Pending legal hold (B)</p> Signup and view all the answers

What type of security control is exemplified by using a proximity card to access a building?

<p>Physical (A)</p> Signup and view all the answers

What is the most effective method for preventing e-mail spoofing?

<p>Cryptographic signature (D)</p> Signup and view all the answers

Why would a security practitioner need a plan to address client-based attacks?

<p>Existing network vulnerabilities (D)</p> Signup and view all the answers

Which principle requires that changes to the plaintext affect many parts of the ciphertext?

<p>Diffusion (A)</p> Signup and view all the answers

In terms of information classification, what should be the first step in the process?

<p>Conducting a data inventory (C)</p> Signup and view all the answers

What is the primary purpose of testing a Disaster Recovery Plan (DRP)?

<p>Validating the effectiveness of the plan (C)</p> Signup and view all the answers

When computer personnel are terminated, what should be the FIRST security action taken?

<p>Remove their computer access (B)</p> Signup and view all the answers

When should re-authentication be required in a user session according to best practices?

<p>After a period of inactivity (D)</p> Signup and view all the answers

Which type of control recognizes excessive transaction amounts according to corporate policy?

<p>Detection (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Ethical Behavior and Strategies Quiz
24 questions
Ethical Behavior Overview
11 questions
Use Quizgecko on...
Browser
Browser