Q:(1). ____ is a type of permission in an unix file which can be assigned to a ______.
(a).execute, administrator
(b).read, group
(c).write, user
(d).All of the above
Q:(2). Which of the following statement is correct for access token ?
(a).It contains the destination for access token.
(b).It contains a list of the privileges held by either the user or the user's groups.
(c).Impersonation Token is a personal token.
(d).All of the above
Best Laptop for Students under 30k
Q:(3). Making a user click on something, disguised as something else, is known as ?
(a).Clickjacking
(b).Brute force attack
(c).Eavesdropping
(d).Waterhole
Q:(4). _____ is a process to break into password protected system.
(a).Dictionary attack
(b).Brute force attack
(c).Rainbow Table Attack
(d).All of the above
Q:(5). For chromium browser, which of the following statement is false ?
(a).It has a rendering engine and browser kernel.
(b).Browser kernel is used to parse html.
(c).It uses v8 java script engine.
(d).All of the above
0 Comments