Q:1. ____ is a type of permission in an unix file which can be assigned to a ______.
1.
2.
3.->
4.
Reason : Write is a type of permission in an unix file which can be assigned to a user and The permissions of a file are the first line of defense in the security of a Unix system. The basic building blocks of Unix permissions are the read, write, and execute permissions1.
2.
3. ->
4.
Reason: Impersonation tokens are a type of personal access token that can only be created by an admin for a specific user. They are a great fit if you want to build applications or scripts that authenticate with the API as a specific user. ... For more information, refer to the users API docs.
Q:3. Making a user click on something, disguised as something else, is known as ?
1. ->
2.
3.
4.
Reason: Clickjacking (classified as a User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while.
1.
2. ->
3.
4.
Reason: a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found and Brute force attack the following is one of the technically simplest processes of gaining access to any password-protected system.
Q:5. For chromium browser, which of the following statement is false ?
1.
2.
3.
4. ->
Reason: Chromium's architecture has two modules: a rendering engine and a browser kernel. At a high level, the render- ing engine is responsible for converting HTTP responses and user input events into rendered bitmaps, whereas the browser kernel is responsible for interacting with the oper- ating system.
No comments :
Post a Comment