Question 1
Which of the following best describes the concept of 'implicit deny' in cybersecurity?
Question 2
Which of the following is a primary characteristic of a buffer overflow attack?
Question 3
Which of the following best describes the primary purpose of a security token in authentication?
Question 4
Which of the following best describes the role of salting in password hashing?
Question 5
An organization is implementing role-based access control (RBAC). Which of the following best describes how permissions are granted in RBAC?