Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.
left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

Prévia do material em texto

Security Specialization
Sample Exam
Before Starting
This sample exam has 8 questions that will help you get ready for the Security
Specialization exam.
We recommend that you prepare a real exam environment, as much as possible.
● Book a quiet room just for you.
● Print this document, apart from the last page.
● Get a stopwatch or set a timer for the (recommended) duration of 30 minutes.
The last page of this document has the correct answers. Don’t peek! Use it only after
completing your exam, to check how well you did.
outsystems.com 1
During the Sample Exam
To accurately simulate the real exam environment, we suggest that you:
● Read each question and its answers carefully.
● Take your time! Questions may be revisited and your choices can be changed.
● Mark the questions that you want to review at the end.
● Pick only one answer per question, as only one is correct.
● Answer all questions, as there’s no benefit in not doing so.
● Try turning off all electronic devices during the exam.
● Refrain from using or reading any external materials during the exam.
After Completing the Sample Exam
After completing the exam, validate the answers you selected by checking the ones
provided on the last page of this document, and count the total number of correct
answers. Since the passing score is 70% or higher, you should get at least 6 questions right.
In case you chose any wrong answers, we suggest you review the study materials where
that specific topic is covered.
outsystems.com 2
Sample Exam Questions
1. A cybersecurity team is investigating a recent incident, where a breach occurred
using an authorized user account. Based on the information collected, the team
believes that the authorized user actually logged in, but then someone else took
over. Which form of attack caused the incident?
A. Man-in-the-middle.
B. Session hijacking.
C. Security misconfiguration.
D. Ransomware.
2. What is the purpose of the CIA security triangle?
A. The CIA triangle defines the three base pillars of information security within an
organization.
B. The CIA triangle defines the three most common security flaws in a development
project.
C. The CIA triangle defines the three defense layers of software security.
D. The CIA triangle defines a security best practices checklist to be followed in a
development project.
3. Consider a scenario where a new security requirement states that the applications'
session login time should have a maximum idle time of 10 minutes. Where can that
information be checked and modified in OutSystems?
A. Infrastructure -> Environment Security section, in LifeTime.
B. Server Request Timeout property of the application's entry module in Service
Studio.
C. Factory -> Applications, select the desired application, and then open the
Security section
D. Administration -> Security -> Applications Authentication section, in Service
Center.
outsystems.com 3
4. Which of the following options is not a valid assumption about adopting Captcha?
A. Adopting Captcha prevents automated harmful actions, assuring actions are only
intentionally performed by humans.
B. Adopting Captcha protects from automated access by bots, avoiding waste of a
service’s resources and reducing opportunities for fraud.
C. Adopting Captcha avoids automated queries from a single IP/asset.
D. Adopting Captcha ensures all incorrect logins are redirected to the proper
authorization process.
5. Consider you are supporting an incident response at MyBank. The attacker used the
Login Screen, but rather than entering login credentials, they entered some odd text:
'1' = '1. What is the best description for this attack?
A. Distributed denial-of-service.
B. Cross-site request forgery.
C. SQL injection.
D. Obfuscation.
outsystems.com 4
6. Consider you are using the Active Directory method without Integrated
Authentication to authenticate the end-users of your OutSystems applications.
Which of the following options describes what happens when an end-user tries to
log into an application?
A. A cryptographic hash function is computed using the end-user's credentials and
compared to the user information stored in the OutSystems database.
B. The end-user is redirected to a web page to enter their credentials. If the
authentication is successful, they are redirected back to the OutSystems
application.
C. The end-user's credentials are validated against the OutSystems database first. If
there is no match, the credentials are validated against the configured domain
server.
D. The end-user gets information in the browser that authentication is required. If
the browser already has the credentials stored, they are automatically sent to the
server. If not, the end-user has to input the credentials. This means that even if the
application has a custom Login page, the end-user will not see it.
7. Which of the following options does not help protect an OutSystems app from
access control/permission vulnerabilities?
A. Hide a widget in the UI that allows triggering/executing an Action with sensitive
logic from users without permission to execute that Action.
B. Implement Screens based on the roles of your applications and make sure they
are adjusted to only have their functionalities available for a particular role.
C. Check in the Action flows if the user logged in has permission to execute a piece
of sensitive logic before actually executing it.
D. Use non-guessable IDs, such as Global Unique Identifiers (GUIDs).
outsystems.com 5
8. Which of the following actions can potentially create a security misconfiguration
vulnerability?
A. Using different admin credentials across environments.
B. Storing system documentation or API request samples as resources in the
applications.
C. Cleaning or protecting your environments for unused components, sandboxes, or
test apps.
D. Not exposing log error stack traces to the end user.
outsystems.com 6
Answers
1. B
2. A
3. D
4. D
5. C
6. C
7. A
8. B
outsystems.com 7

Mais conteúdos dessa disciplina