Professional Documents
Culture Documents
Before Starting
This sample exam has 8 questions that will help you get ready for the Security
Specialization exam.
minutes.
The last page of this document has the correct answers. Don’t peek! Use it only
● Take your time! Questions may be revisited and your choices can be
changed.
● Refrain from using or reading any external materials during the exam.
After Completing the Sample Exam
After completing the exam, validate the answers you selected by checking the ones
provided in the last page of this document, and count the total number of correct
answers. Since the passing score is 70% or higher, you should get at least 6
questions right. In case you chose any wrong answers, we suggest you review the
⃞ A. Man-in-the-middle.
⃞ B. Session hijacking.
⃞ C. Security misconfiguration.
⃞ D. Ransomware.
⃞ A. The CIA triangle defines the three base pillars of information security
within an organization.
⃞ B. The CIA triangle defines the three most common security flaws in a
development project.
⃞ C. The CIA triangle defines the three defense layers of software security.
⃞ C. Factory -> Applications, select the desired application and then open the
Security section
⃞ A. Distributed denial-of-service.
⃞ C. SQL injection.
⃞ D. Obfuscation.
6. Consider you are using the Active Directory method, without Integrated
Authentication, to authenticate the end-users of your OutSystems
applications. Which of the following options describes what happens when
the user tries to login an application?
1. B
2. A
3. D
4. D
5. C
6. C
7. A
8. B