You are on page 1of 26
ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore BORED retest gp ennicoes Hai sine @ 2) Oracle Secero ,Imperva SecureSphere and Green$QL are examples of which of the following Database products options: Database Security Assessment Tools Database Scanning Toole database Firewalls None ofthe Above 1 skip question CS Interna wpe ole rips calms ukimatnet/Saba Wie wak/Mairycoatent/players/SequencedPlayerRedirecrdjcessonid =H J1f8myY 16Orw THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore BORED creteetie genic Hai sine @ 3) In cases wivrein some insider deletes some eritical data and or when we need te reconstruct ime scenes then ‘which ofthe following activites can be implemented : options: Database Security Assessment Database Scanning database Forensics None ofthe Above BMI st c1e-100 Ce downoad vidoo fom this pags) 28, CS Interna wpe ole proc sect ABS eps icalms utimatiznet/Saba/Web,wdk/Mair/content/players/SequencedPlayerfedirocrdfjsessionid-HTI1)f8my¥ Or [ee acosuanaranes ene volo 24 for he Re pled de our ‘Trancrlp ond de te pm loko Launcher complet tet asa vl eer ante Paik vie @ 41) Which oF the following methods can be used to protect database serves? options: Lock and Expire Unused Accounts [change Default Passwords Derine and Enforce a Good Passwocd Policy Alle the Above ACS Internal woe ot rips calms utimatinet/Saba Web wak/Mair/coatent/players/SequencedPlayerRedirecrdtjcessonid =H J1F8myY 16Onw THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore commited sits Urersweed: 16 Hai sine @ '5) SQL Slammer 2 worm took advantage ofa fla in Microsoft SQL Server protocol to cause which of the Ftloing utter overtow SQL Injection Phishing Denial Of Service MUI oven Ce downioad vidoo om this pags) 28, CS Interna wpe ole eps icalms utimatiznet/Saba/Web,wdk/Mair/content/players/SequencedPlayerfedirocrdfjsessionid-HTI1)f8my¥ Or [ee acosuanaranes Pesca or 24 re Rea he played mde our ‘Tsang nd ee te pm ‘leben Lam ferme te anal eer sneer Paik vie @ 6) Which ofthe following Is atest deta generating tool = restry None of the above (download video tram tis pga) 28, ACS Internal woe ot precip scPnck ABS) rips calms ukimatnet/Saba Wie wak/Mairycoatent/players/SequencedPlayerRedirecrdjcessonid =H J1f8myY 16Orw THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore Comer esis 27) Tabular Data Stream (TDS) is @ Database Communication Protocol of which ofthese vendors sybase mssql 0th None of the above 1 skip Question CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN "ei hb a he dtu Fc Comer esis '8) Coxe updates which are applied to previously release versions of products to remove vulnerabiltes are known Options: Patches Service Packs All cf the Above BMI st c1e-100 CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore custo sot0 I aa Sen Hai sine @ 9) Which statement i considered okey issue associated with data security? Determining who has acess, 35 well asthe degree of access. Protecting the data trom unauthorized use and sabotage Protecting the data from physical harm or accident. All f the above. 1 skip Question CS Interna wpe ole D CALMS - Google Grome - =m {frp calmstimatixnat/Saba/Web_ wel ain/contentlayers/SequencadPlayerRediracraieessionid-H7N J) ” ene walor24 fre Raab played mde our ‘Transp? wnd de ee ‘eken' Lam aur compen ara er snore question 10 of 20 a 10) Database communication protocol attacks can be defeated with technology commonly referred to as “Communication vaiaaten SQL validation None of the above ((>-Dowriond video romitisnone 2) 415 Inter! woe oy. preston Baar D IAIMS - Google Gome realm itimataxnet/Saba/ Web dk/Main/contentplayersSequancedPayerediaceratjessionid= sean tt mde your ‘Tranerip end de et Question 11 of 20 41) Database tables should be encrypted using which ofthe flloin fandom numbers tong passwocd A FIPS- or EAL certified alge ((-ewriond ideo romitisnene 22) ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore BOOMER crete gms Hai sine @ 42) One ofthe major attacks that can be used to explit databases are Insecuraly Storing cf Database Credentials sqU injection Prege misuse {All ofthe above 1 skip Question CS Interna wpe ole rips calms ukimatnet/Saba Wie wak/Mairycoatent/players/SequencedPlayerRedirecrdjcessonid =H J1f8myY 16Orw THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore BOOMER cresting tame Hai sine @ 22) What option must 2 user have te grant another user prileges on an object not owned by the user? EIGRANT OPTION. ALLOW OFTION. 1 skip Question CS Interna wpe ole rp icalmitimatixnet/Saba/ Web Main/content/layers/SequencedPlay rftairacrdjeetsonia-H7lJimyY 1B0M "ei hb a he dtu Fc vero a a Hai sine @ 214) Encrypting Backup data is an essential activity te prevent database attacks Comment Options: true Both BMI st c1e-100 CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore Hai sine @ 45) Oracle supports which ofthe folowing types of accounts = Database Accounts ‘operating System Accounts None of the Above Both of the Above 1 skip Question CS Interna wpe ole rips calms ukimatnet/Saba Wie wak/Mairycoatent/players/SequencedPlayerRedirecrdjcessonid =H J1f8myY 16Orw THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore POORETEE cresting tame Hai sine @ 16) Is an attack wherein an attacker is able to gain access to unauthorized data using malicious injected atements Options: ‘© Databae injection SQL phishing sql injection None ofthe stove BMI st c1e-100 CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN "ei hb a he dtu Fc EE crete g emenn Hai sine @ 27) Primary reason why organizations are reluctant to patch databases is/are = Downtime net permissible Extensive testing and montering Ignorance about updates All the Above 1 skip Question CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore Pant POORER cresting tame Hai sine @ 38) Network Layer Defense mechanisms lke the following can help inspect database trafic and identify ‘ulnerabities options: TAs ers None ofthe stove 1 skip question CS Interna wpe ole rips calms ukimatnet/Saba Wie wak/Mairycoatent/players/SequencedPlayerRedirecrdjcessonid =H J1f8myY 16Orw THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore nestor 200120 a Hai sine @ 20) The attacker repeatedly enters username/password combinations until he finds one that works. this attack is iknow a5 # Options: erate Force SQL Injector Buffer Overfiow 1 skip question CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘runt ‘eken' Lam aur compen ara er snore FORE crete temiens <== Hai sine @ 4) What Identity Management is NOT/SHOULD NOT BE: ‘A technclogy only solution Isolated to IT ether aoe B Booth Age “Tactical n nature CS Interna wpe ole proc dcPtckWneBSurit) ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore BOOM cresting ceimienes Hai sine @ 2) Which ofthese isan electronic “red card” hich establishes a user's credentials when doing business or other ‘transactions onthe Web and Is Issued by a certification authority 7 Options: Private Key smart Card ictal Certicate BMI st c1e-100 CS Interna wpe ole proc dcPtckWneBSurit) ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘runt ‘eken' Lam aur compen ara er snore BOOMER cresting ceimiens Hai sine @ 3) Directory Services provides which of the flloning : quick access to entry and authonzatian information about indus, and supports authentication and authorisation to acces resources [ule acces to idantiy information abou Indivduale, and supports authentication None of the above Both ofthe above 1 skip question CS Interna wpe ole proc dcPtckWneBSurit) ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore Comet n semis Hai sine @ 44) How do roles map to entities? “There isa oneste-one mapping ofeach Identity to role. [Scenes may be assigned multiple roles with a rote cerrespanaing toa unique grouping of entitlements or prwlenes. Roles map one-to-one to enitements, and entitlements map one-to-one to rte. None ofthe eve BMI st c1e-100 CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN "ei hb a he dtu Fc BOO creeesin gcse Hai sine @ 6) Which ofthese is type of authentication device which consists of a reader/scanner and software that encrypts and “converts the scanned Information into dial form so it can be compared with previous records? Options: Security 10 Digital Certeste Brain Fingerprinting siemerric BMI st c1e-100 CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘runt ‘eken' Lam aur compen ara er snore BOOMER cresessie gp ceimien 2) Which consumer authentication technique evaluates the user's tying (both the time between keystrokes ad the te that Fey's pressed) os pat ofthe use authentication process? Options: Mobile PKL Single sign-on(8S0) Behaviral Biometrics ‘onetime password (OTP) devices 1 skip question CS Interna wpe ole proc dcPtckWneBSurit) ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] aA mde your ‘Tranerip end de et ‘mca er compldng te atari vegies step BOSE cresting cemien Hai sine @ '8) Access Management Contains ‘Authentication, Authonaation, Plcy Management , Federation [Saurnenccaton, Authorization, Policy Management ‘Authentication, Authonzation, Federation None of the above MUI oven CS Interna wpe ole ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] "HEA ene walor24 fre Raab played mde our ‘Transp? wnd de ee ‘mca ‘eken' Lam aur compen ara er snore nt BONEEEREDE creed gente Hai sine @ '9) What are the categories of rates in reference to identty an access management ? Permanent & Temporacy Permanent & Prowssoning Temporary & Admin Admin & Provisioning MUI oven CS Interna wpe ole proc dcPtckWneBSurit) ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore POORER crete gems Hai sine @ 320) Which authentication mechanism isthe easiest to deploy and the easiest to break? | shared Secret (passwords and PINs) Blomesnies Geolocation Tokens 1 skip Question CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] "HEA ene walor24 fre Raab played mde our ‘Transp? wnd de ee oe ‘eken' Lam aur compen ara er snore PEER contnicted iy @ reeset 41) Which of the folowing authentication methods would provide the highest level of identity assurance for a Web~ ised human resources apolction wth SSL enabled onthe Webserver? Options: X.509 cartficate with private key stored in software ardware-based one-time password (OTF) device (x.509 exrtifcate with private key stored on a smart card Password BMI st c1e-100 CS Interna wpe ole ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] "HEA ene walor24 fre Raab played mde our ‘Transp? wnd de ee oe ‘eken' Lam aur compen ara er snore PEND coscted iy: @ roemieas Hai sine @ 432) What isan identity >, [Ban ident ca pce of information used to Identify an entity whether ts @ user oF group Identity isnot a part of 14M solution None of the ove Not sure Skip Question CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore EOOREEEEE cresting mms = Hai sine @ 413) The process of giving somecne permission to do or have something is known as: Biautnorzation ‘Authentication ‘valabity Accounting 1 skip Question CS Interna wpe ole ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore PEN coset iy: @ reece, 7 Hai sine @ 14) How are Identity Management Solutions Implemented? Inventory and assess current investments and processes. lean and consolidate identity data stores. Create ‘vrtualdemtities for enterprise users Design and deploy Identity infrastructure components. Create Identity prowsioning and deploy password ‘management, user sof service, and regulatory compliance Deliver applications and services. Acess management deployed to Gean environment. Leverage federated Identity for improving supply chain and employee eficences. BBall the above 1 skip Question CS Interna wpe ole ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] "HEA ene walor24 fre Raab played mde our ‘Transp? wnd de ee oe ‘eken' Lam aur compen ara er snore Hai sine @ 45) What are the parts of 1AM ? dene ue ce management, Aeets Management Ident Reposton/Drecery Servs, Cres cuter identity Life cycle Management, access Management, Identy Repesttry/Directery Services entity Life Cycle Management, Access Management None ofthe seve BMI st c1e-100 CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] "HEA es wl 2 ele asa Tena EOOREEEEE crete g cemen 36) In which ofthe following attacks , hackers often gain entry toa network pretending tobe a legitimate ‘computer? BMI st c1e-100 CS Interna wpe ole ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore Pant question 17 of 20, ET ra ni Hai sine @ 417) Which ofthe following attack methads dees not apply to hardware-based one-time password (OTP) devices? Harvesting Impersonation Mancinthe-midale private key malvare IEE 1 sti cueston CS Interna wpe ole proc dcPtckWneBSurit) ps icalms utimatiznet/Saba/ Web wdk/Mair/content/players/SequencedPlayerfedirecrajessionid=HTI1)%8myY thor] "HEA ene walor24 fre Raab played mde our ‘Transp? wnd de ee oe ‘eken' Lam aur compen ara er snore PORE cretecior geen = 48) Which ofthe folowing need (5) Identity & Access Management solution ? utipe Directories uditers! Requirements All the above 1 skip Question CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] "HEA es wl 2 ele asa Tena PORE crete gp maene = 439) Which ofthese is a two-level scheme for authenticating network users Functions as part of the Web's Hypertext “Transfer erotocol ? BMI st c1e-100 CS Interna wpe ole ps/icalms utimataunet/Saba/Web_.wdk/Main/content/players/SequencedPlayerfediracrajessionid=H7I1)1f&myY thor] THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore POORER crete g temen Hai sine @ 20) What is an active entity? [A person, a service or a system ‘one that can actor execute Users or application services Ball the above ‘Skip question CS Interna wpe ole rips calms ukimatnet/Saba Wie wak/Mairycoatent/players/SequencedPlayerRedirecrdjcessonid =H J1f8myY 16Orw THEN ce valor 24 fr Re ok pled de our Transp on de et ‘eken' Lam aur compen ara er snore BORED creteetie genic Hai sine @ 3) In cases wivrein some insider deletes some eritical data and or when we need te reconstruct ime scenes then ‘which ofthe following activites can be implemented : options: Database Security Assessment Database Scanning database Forensics None ofthe Above 1 skip question Ce Downoad video trom tis page 22, {CS Internal use onlye proc sect ABS

You might also like