Q1. Which one of the following is not a mandatory access control?
Rule-based access control
Role-based access control
Lattice based access control
Discretionary access control
Q2. If access to an object is controlled based on parameters such as location, time, and so on, then this type of access control is known as what?
Content-dependent access control
Context-dependent access control
Character-dependent access control
Class-dependent access control
Q3. Which one of the following is also called as a logic bomb?
Spoofing
Trojan horse getting activated on an event
Vulnerability exploitation by an attacker
Virus
Q4. Dictionary attack is a type of?
Denial-of-Service attack
Spoofing
Password guessing attack
Social engineering
Q5. Basic functionality of the malicious code is to_______.
Upgrade the operating system
Execute itself in the client system
Spoof
Denial-of-Service
Q6. CAPTCHA is one of the popular mechanisms used by websites to control input to the access control system is supplied by humans...