Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Security Assessment Interview Questions and Answers
Home
Questions
Security Assessment
0
votes
Q: Sexual harassment is prohibited by law and is also prohibited by my employer’s policy.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: Sexual harassment can only come from a boss or coworker. FALSE Harassment can exist at all levels of an organization.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: Harassment based on sex can include making stereotypical remarks about someone’s gender.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: If most people find a comment amusing and inoffensive, then the one person who is offended does not have a right to complain about harassment.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: If someone is offended by my behavior in the break room, they should take their break somewhere else, or at another time, since I am not “working” while I’m on my break and I have a right to freedom of speech.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: Quid Pro Quo harassment occurs when a female boss tells dirty jokes to the other women in the office.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
quid-pro-quo
security
0
votes
Q: It cannot be sexual harassment if both parties are the same gender
asked
Nov 5, 2022
in
Security Assessment
by
Robin
secuity
0
votes
Q: If my intentions were good – for example, I meant to compliment someone on how great they looked there is no way my conduct could violate the sexual harassment policy.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: If no one complains, then it’s not sexual harassment
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: The type of vulnerability scan that facilitates access to low level data.
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
vulnerability-type
0
votes
Q: Which among the following aims at bringing the level of acceptable risk and the current risk level in line?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
acceptable-risk
0
votes
Q: The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
tcp
icmp
operating-system
0
votes
Q: The type of security assessment that aims to test the organizations detection and response capabilities
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-detection
0
votes
Q: A process that aims to gain information about a system without directly engaging with the system is known as _______________
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
information-threat
0
votes
Q: Which of the following aims to integrate the defensive tactics and controls from the Blue Team with the threats and vulnerabilities found by the Red Team into a single objective?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
defensive-tactics
threats
vulnerabilities
0
votes
Q: A type of testing with limited knowledge of the internal working of an application
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
testing
internal-application-testing
0
votes
Q: Which of the following assessment type works to determine whether a threat made detected, is genuine?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
threat-mode
threat-detection
0
votes
Q: Which among the following involves evaluating security against a standard to check for complaince?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-evaluating
0
votes
Q: Which of the following is best used for penetration testing?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
penetration-testing
0
votes
Q: Passive fingerprinting sends and collects traffic to from the target system.
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
passive-fingerprints
0
votes
Q: Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-analysis
0
votes
Q: Which of the following can be considered as a sound example of social engineering attack?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
user-account
0
votes
Q: A type of computer attack that in which the intruder engages with the targeted system is known as _______________
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
computer-attack
target-system
0
votes
Q: Which among the following companies have bug bounty programs?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
bug-bounty-programs
0
votes
Q: Penetration testing is also called as ethical hacking.
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
penetration-testing
ethical-hacking
0
votes
Q: Which of the following best finds uncommon and eccentric issues?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
eccentric-issues
0
votes
Q: During the scanning phase of pen testing, which of the following method analyzes an applications code to determine its behavior during runtime?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
scanning-phase
security-phase
0
votes
Q: Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-mistakes
0
votes
Q: The risk level decreases with increase in the likelihood of potential risk.
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
risk-assessment
0
votes
Q: Assessing security and auditing security mean the same thing.
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-assessing
security-audit
Page:
« prev
1
2
3
next »
...