

MCQOPTIONS
Saved Bookmarks
This section includes 7 Mcqs, each offering curated multiple-choice questions to sharpen your Junit knowledge and support exam preparation. Choose a topic below to get started.
1. |
_________ is driven by an Audit or a Risk function to look at a specific control or compliance issue. |
A. | Security Audit |
B. | Vulnerability Scan |
C. | Vulnerability Assessment |
D. | Penetration Test |
Answer» B. Vulnerability Scan | |
2. |
__________ uses discovery and vulnerability scanning to identify security vulnerabilities |
A. | Discovery |
B. | Vulnerability Scan |
C. | Vulnerability Assessment |
D. | Penetration Test |
Answer» D. Penetration Test | |
3. |
_____________ looks for known security issues by using automated tools to match conditions with known vulnerabilities. |
A. | Discovery |
B. | Vulnerability Scan |
C. | Security Assessment |
D. | Penetration Test |
Answer» C. Security Assessment | |
4. |
________________ means to ensure that a transferred message has been sent and received by the intended parties who are claiming to have sent and received the message. |
A. | Confidentiality |
B. | Authentication |
C. | Non-repudiation |
D. | Integrity |
Answer» D. Integrity | |
5. |
_______________ of information refers to protecting information from being modified by unauthorized parties. |
A. | Confidentiality |
B. | Authentication |
C. | Authorization |
D. | Integrity |
Answer» E. | |
6. |
______________ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. |
A. | Integrity Testing |
B. | Unit Testing |
C. | Security Testing |
D. | Stress testing |
Answer» D. Stress testing | |
7. |
The review process for a particular review begins with a _____________ by the author to the moderator in formal review. |
A. | Request For Review |
B. | Requirement Analysis |
C. | Notice For Review |
D. | Goal Design |
Answer» B. Requirement Analysis | |