CSS quiz 7 AKTU PRUTOR - Scifi Curoisity
  • CSS quiz 7 AKTU PRUTOR


     


    Q:1. ____ is a type of permission in an unix file which can be assigned to a ______.

    1.
    2.
    3.->
    4.
    Reason : Write is a type of permission in an unix file which can be assigned to a user and The permissions of a file are the first line of defense in the security of a Unix system. The basic building blocks of Unix permissions are the read, write, and execute permissions
    Q:2. Which of the following statement is correct for access token ?
    1.
    2.
    3. ->
    4.
    Reason: Impersonation tokens are a type of personal access token that can only be created by an admin for a specific user. They are a great fit if you want to build applications or scripts that authenticate with the API as a specific user. ... For more information, refer to the users API docs.

    Q:3. Making a user click on something, disguised as something else, is known as ?
    1. ->
    2.
    3.
    4.
    Reason: Clickjacking (classified as a User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while.

    Q:4. _____ is a process to break into password protected system.
    1.
    2. ->
    3.
    4.
    Reason: a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found and Brute force attack the following is one of the technically simplest processes of gaining access to any password-protected system.

    Q:5. For chromium browser, which of the following statement is false ?
    1.
    2.
    3.
    4. ->

    Reason: Chromium's architecture has two modules: a rendering engine and a browser kernel. At a high level, the render- ing engine is responsible for converting HTTP responses and user input events into rendered bitmaps, whereas the browser kernel is responsible for interacting with the oper- ating system.
  • You might also like

    No comments :

    Post a Comment

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

CSS Quiz 5 AKTU

  Q1) Chroot jail is used to _______ process and its children by ________ to the supplied directory name. isolate, changing the root directory ->  change, the name execute, renaming it All of the above Reason :   A  chroot jail  is a way to isolate a process and its children from the rest of the system. It should only be  used  for processes that don't run as root, as root users can break out of the  jail  very easily Q2) Taliking about FreeBSD jail, which of the following is true ? It can only bind to sockets with specified IP address and authorized ports ->  It can communicate with processes inside and outside of jail Root is limited (example: cannot load kernel modules) None of the above Reason :   The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the sam...

HOW TO ADD TAGS IN YouTube VIDEOS GET IN RECOMENDED YOUR VIDEO

                                                                      GET YOUR VIDEOS IN RECOMMENDED FOLLOWING STEPS TO UPLOAD YOUR VIDEO IN YOUTUBE OPEN CHROME (IN MOBILE USE DESKTOP MODE) GO TO YOUR CHANNELL.                                                        2.  GO TO YOUR VIDEOS THOSE UPLOADED.                             3. CLICK ON EDIT ICON WHICH VIDEO YOU WANT.                         4. YOU CAN EDIT HERE ALL WHICH CAN HELP YOUR VIDEOS EASLY TO ...

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3. Upper case and lower-case letters, numbers and non letter characters 4. -> Upper case and lower-case letters, numbers and symbols Reason: The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words Q:2.  The cookies we use, are sent with ______, which in general, _____ the performance. 1. only when requested,improves 2. -> every request, degrades 3. extra information, is useless for 4. None of the mentioned Reason : typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus perfo...

Featured