Computer system security quiz 7 Solution | Css quiz week 7 Answer with Reason | css quiz aktu

 




NOTE :- MY YOUTUBE CHANNEL HAS DISABLE SO I CREATE NEW YOUTUBE CHANNEL ( old youtube channel name is FreeTechnology)
PLEASE SUPPORT  OUR YOUTUBE CHANNEL LINK  IS ...

Please subscribe now ( GO TO CHANNEL CLICK HERE  )

Important Notes:- 

Hello Dosto Please Subscribe Our Youtube channel  Because Copyright Problem In this post ( python / css / Al / nptel ) So please i humble Request Subscribe Our channel or social Networks ( than we are all are connect To each and every person ) These are Our youtube channel My Youtube Channel .. only 321 subscribe in my youtube  channel .(  channel ko subscribe kar lo kyuki kabhi bhi website band ho sakti hai sar post 2019 se ho rhe hai or answer sare senior ke dwara batye hue hai ) . youtube channel ko jaldi se share karo tak jada subscribe ho jaye to copyright ka koi problem na ho .. thanks 



Q:(a). ____ is a type of permission in an unix file which can be assigned to a ______.

(a).execute, administrator
(b).read, group
(c).write, user
(d).All of the above
 
Answer:- (c).write, user

Reason :- Write is a type of permission in an unix file which can be assigned to a user and The permissions of a file are the first line of defense in the security of a Unix system. The basic building blocks of Unix permissions are the read, write, and execute permissions

Q:(2). Which of the following statement is correct for access token ?

(a).It contains the destination for access token.
(b).It contains a list of the privileges held by either the user or the user's groups.
(c).Impersonation Token is a personal token.
(d).All of the above

Answer:- (c).Impersonation Token is a personal token.

Reason:-Impersonation tokens are a type of personal access token that can only be created by an admin for a specific user. They are a great fit if you want to build applications or scripts that authenticate with the API as a specific user. ... For more information, refer to the users API docs.





Q:(3). Making a user click on something, disguised as something else, is known as ?

(a).Clickjacking
(b).Brute force attack
(c).Eavesdropping
(d).Waterhole

Answer:- (a).Clickjacking

Reason:- Clickjacking (classified as a User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while.



New Youtube Channel link https://youtu.be/d3rfvMLs_kk


Q:(4). _____ is a process to break into password protected system.
(a).Dictionary attack
(b).Brute force attack
(c).Rainbow Table Attack
(d).All of the above

Answer:- (b).Brute force attack

Reason:-a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found and Brute force attack the following is one of the technically simplest processes of gaining access to any password-protected system.


New Youtube Channel link https://youtu.be/d3rfvMLs_kk


Q:5. For chromium browser, which of the following statement is false ?

(a).It has a rendering engine and browser kernel.
(b).Browser kernel is used to parse html.
(c).It uses v8 java script engine.
(d).All of the above

Answer:- (d).All of the above
Reason:-Chromium's architecture has two modules: a rendering engine and a browser kernel. At a high level, the render- ing engine is responsible for converting HTTP responses and user input events into rendered bitmaps, whereas the browser kernel is responsible for interacting with the oper- ating system.

Post a Comment

12 Comments