Q13 Flashcards
The order for authentication are…?
A. login, access control mechanism, resources
B. access control mechanism, login, resources
C. resources, login, access control mechanism
D. none of the above
A. login, access control mechanism, resources
Three-factor authentication includes...? A. Fingerprint & card &PIN B. Fingerprint & PIN & password C. both a and b D. none of the above
A. Fingerprint & card &PIN
Which of these is one of the three types of security attacks? A. Confidentiality B. Integrity C. Availability D. all of the above
D. all of the above
Which of these is NOT true about cross site scripts?
A. it may bypass access controls such as the same-origin policy
B. rather than entering SQL code, hackers enter code to run Java in an input field
C. it enables attackers to inject client-side scripts into web pages
D. XSS was for roughly 84% of all security vulnerabilities documented by Symantec up until 2007
B. rather than entering SQL code, hackers enter code to run Java in an input field
Two-factor authentication includes? A. ATM card + PIN B. Password + PIN C. both a and b D. none of the above
A. ATM card + PIN
You can authenticate by...? A. What you know B. What you have C. What you do D. All of the above
D. All of the above
Which of these is correct about security?
A. it is advised that you allow database connection script to be directly accessible
B. most vulnerabilities come from code defects or things overlooked
C. special html and escape characters increase security strength
D. not many current hacks are due to known old vulnerabilities
B. most vulnerabilities come from code defects or things overlooked
When it comes to authentication factors, something you know is a password or pin
A. True
B. False
A. True
Having different passwords to encrypt and decrypt is called: A. Multi-factor encryption B. Asymmetric encryption C. Hashing D. none of the above
B. Asymmetric encryption
‘Hashing’ is another way of saying ‘encrypting’
A. True
B. False
B. False
When it comes to authentication factors, something you are is a personal trait
A. True
B. False
A. True
One way to avoid SQL injections is to remove quotes from the variables used in the query string
A. True
B. False
A. True
Programs in Java and JavaScript are vulnerable buffer overflow attacks
A. True
B. False
B. False
When it comes to authentication factors, something you have is a key or token
A. True
B. False
A. True
Each User ID is associated with a secret
A. True
B. False
A. True