Deck 1: Exploring Security Programs, Cryptography, and Authentication Methods

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not a benefit of Security Program?

A)business agility
B)cost reduction
C)portability
D)frees ram
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
which of the following is not a synonym of crypt?

A)light
B)vault
C)chamber
D)hidden
سؤال
Which of the following is incorrect about OAuth Authentication?

A)it is an open standard for token-based authentication and authorization on internet
B)it allows user\s account information to be used by third party sevices without exposing user\s password
C)oauth acts as an intermediary on behalf of user
D)oauth stands for onion-route authorization
سؤال
IDS and _______ are important tools in a computer security arsenal.

A)network-based intrusion detection system
B)host-based intrusion detection system
C)intrusion prevension system
D)security information and event management
سؤال
____________ is often known as a reversed version of Bell-LaPadula

A)biba
B)tcsec
C)clark-wilson
D)security target
سؤال
Virtual machine can be divided into_______________

A)super vm, system vm
B)super vm, cloud computing
C)system vm, process vm
D)cloud computing, system vm
سؤال
Thick client application is classified into ________ type

A)1
B)2
C)3
D)4
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/7
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Exploring Security Programs, Cryptography, and Authentication Methods
1
Which of the following is not a benefit of Security Program?

A)business agility
B)cost reduction
C)portability
D)frees ram
frees ram
2
which of the following is not a synonym of crypt?

A)light
B)vault
C)chamber
D)hidden
light
3
Which of the following is incorrect about OAuth Authentication?

A)it is an open standard for token-based authentication and authorization on internet
B)it allows user\s account information to be used by third party sevices without exposing user\s password
C)oauth acts as an intermediary on behalf of user
D)oauth stands for onion-route authorization
oauth stands for onion-route authorization
4
IDS and _______ are important tools in a computer security arsenal.

A)network-based intrusion detection system
B)host-based intrusion detection system
C)intrusion prevension system
D)security information and event management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
5
____________ is often known as a reversed version of Bell-LaPadula

A)biba
B)tcsec
C)clark-wilson
D)security target
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
6
Virtual machine can be divided into_______________

A)super vm, system vm
B)super vm, cloud computing
C)system vm, process vm
D)cloud computing, system vm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
7
Thick client application is classified into ________ type

A)1
B)2
C)3
D)4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.