Q13 Flashcards

1
Q

The order for authentication are…?
A. login, access control mechanism, resources
B. access control mechanism, login, resources
C. resources, login, access control mechanism
D. none of the above

A

A. login, access control mechanism, resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Three-factor authentication includes...?
 A. Fingerprint & card &PIN
 B. Fingerprint & PIN & password
 C. both a and b
 D. none of the above
A

A. Fingerprint & card &PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of these is one of the three types of security attacks?
 A. Confidentiality
 B. Integrity
 C. Availability
 D. all of the above
A

D. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of these is NOT true about cross site scripts?
A. it may bypass access controls such as the same-origin policy
B. rather than entering SQL code, hackers enter code to run Java in an input field
C. it enables attackers to inject client-side scripts into web pages
D. XSS was for roughly 84% of all security vulnerabilities documented by Symantec up until 2007

A

B. rather than entering SQL code, hackers enter code to run Java in an input field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Two-factor authentication includes?
 A. ATM card + PIN
 B. Password + PIN
 C. both a and b
 D. none of the above
A

A. ATM card + PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
You can authenticate by...?
 A. What you know
 B. What you have
 C. What you do
 D. All of the above
A

D. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of these is correct about security?
A. it is advised that you allow database connection script to be directly accessible
B. most vulnerabilities come from code defects or things overlooked
C. special html and escape characters increase security strength
D. not many current hacks are due to known old vulnerabilities

A

B. most vulnerabilities come from code defects or things overlooked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When it comes to authentication factors, something you know is a password or pin
A. True
B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Having different passwords to encrypt and decrypt is called:
 A. Multi-factor encryption
 B. Asymmetric encryption
 C. Hashing
 D. none of the above
A

B. Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

‘Hashing’ is another way of saying ‘encrypting’
A. True
B. False

A

B. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When it comes to authentication factors, something you are is a personal trait
A. True
B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One way to avoid SQL injections is to remove quotes from the variables used in the query string
A. True
B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Programs in Java and JavaScript are vulnerable buffer overflow attacks
A. True
B. False

A

B. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When it comes to authentication factors, something you have is a key or token
A. True
B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Each User ID is associated with a secret
A. True
B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DoS stands for denial of security
A. True
B. False

A

B. False