0% found this document useful (0 votes)
42 views5 pages

Week 7 Graded Assessment: Progress Weekly Quiz Report

This document contains a weekly quiz report on security topics with 15 multiple choice questions. It shows the questions, answers chosen, and whether the answer was correct or not. The report tracks the user's progress and provides a score. In total, the user answered 11 questions correctly out of 15 for a final score of 11 points.

Uploaded by

Prakhar Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views5 pages

Week 7 Graded Assessment: Progress Weekly Quiz Report

This document contains a weekly quiz report on security topics with 15 multiple choice questions. It shows the questions, answers chosen, and whether the answer was correct or not. The report tracks the user's progress and provides a score. In total, the user answered 11 questions correctly out of 15 for a final score of 11 points.

Uploaded by

Prakhar Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

20/12/2019 Self Learn Problems

Weekly Quiz Report Progress

Week 7 Graded Assessment

Q:1. Which of the following is not a level of access control on UNIX systems?
1. User

2. Administrator

3. Group

4. Other

Answer is incorrect
Score: 0

While Correct Answer:


Administrator 0 point

Q:2. Which of the following permission types a UNIX file can be assigned?
1. Read

2. Write

3. Execute

4. All of the above

Yes,the answer is correct


Score: 1

Accepted Answer:
All of the above 1 point

Q:3. Which of the following information is contained in the access tokens?


1. The security identifier (SID) for the user's account

2. A list of the privileges held by either the user or the user's groups

3. The SID for the primary group

4. All of the above

Yes,the answer is correct


Score: 1

s.aktu.ictacademyiitk.ac.in:82/weekly-quiz-report 1/5
20/12/2019 Self Learn Problems

Accepted Answer:
All of the above 1 point

Q:4. An access token that has been created to capture the security information of a client
process, allowing a server to "impersonate" the client process in security operations.
1. Primary Token

2. Process Token

3. Personalized Token

4. Impersonation Token

Yes,the answer is correct


Score: 1

Accepted Answer:
Impersonation Token 1 point

Q:5. Which of the following is not a common password myth?


1. The best length of password is 8 characters

2. Replacing characters with numbers is good (e.g. J0hn_Sm1th)

3. Passwords can include spaces

4. None of the above

Answer is incorrect
Score: 0

While Correct Answer:


Passwords can include spaces 0 point

Q:6. Which of the following is one of the technically simplest processes of gaining access
to any password-protected system?
1. Clickjacking

2. Brute force attack

3. Eavesdropping

4. Waterhole

Yes,the answer is correct


Score: 1

Accepted Answer:
Brute force attack 1 point

s.aktu.ictacademyiitk.ac.in:82/weekly-quiz-report 2/5
20/12/2019 Self Learn Problems

Q:7. A _______________ is a process of breaking a password protected system or server


by simply & automatically entering every word in a dictionary as a password.
1. Dictionary attack

2. Phishing attack

3. Social engineering attack

4. MiTM attack

Yes,the answer is correct


Score: 1

Accepted Answer:
Dictionary attack 1 point

Q:8. Brute force attack is usually ______________


1. fast

2. inefficient

3. slow

4. complex to understand

Yes,the answer is correct


Score: 1

Accepted Answer:
slow 1 point

Q:9. Which of the following is not an advantage of dictionary attack?


1. Very fast

2. Time-saving

3. Easy to perform

4. Very tough and inefficient

Yes,the answer is correct


Score: 1

Accepted Answer:
Very tough and inefficient 1 point

Q:10. Which of the following is a vulnerability in web browser?


1. Cross Site Scripting

2. Implementation bugs

s.aktu.ictacademyiitk.ac.in:82/weekly-quiz-report 3/5
20/12/2019 Self Learn Problems

3. Both A and B

4. Buffer overflow

Yes,the answer is correct


Score: 1

Accepted Answer:
Both A and B 1 point

Q:11. The _______ is an object in web browser.


1. Frames

2. DOM

3. Cookies

4. All of the above

Answer is incorrect
Score: 0

While Correct Answer:


All of the above 0 point

Q:12. Which of the following is not a component of security policy?


1. Frame – Frame relationships

2. Frame – principal relationships

3. Principal – Principal relationships

4. None of the above

Yes,the answer is correct


Score: 1

Accepted Answer:
Principal – Principal relationships 1 point

Q:13. Chromium browser has the module ________ in separate protection domains
1. Rendering engine

2. Browser kernel

3. Browser process

4. Both A and B

Yes,the answer is correct


Score: 1
s.aktu.ictacademyiitk.ac.in:82/weekly-quiz-report 4/5
20/12/2019 Self Learn Problems

Accepted Answer:
Both A and B 1 point

Q:14. Which of the following is not a task assigned to browser kernel?


1. HTML parsing

2. Window management

3. Password database

4. Download manager

Yes,the answer is correct


Score: 1

Accepted Answer:
HTML parsing 1 point

Q:15. The percentage of phishing in sampling of 2015 security incidents is ______.


1. 8.9%

2. 4.9%

3. 2.9%

4. 0.9%

Yes,the answer is correct


Score: 1

Accepted Answer:
2.9% 1 point

Progress

s.aktu.ictacademyiitk.ac.in:82/weekly-quiz-report 5/5

You might also like