Web Security and forensics MCQs

Web Security and forensics MCQs

  1. which attacks, the attacker manage’s to take control of the application to execute an SQL query created by the attacker…
    a) SQL injection
    b) Direct
    c) SQL
    d) Application
    e) None of these
    Answer - Click Here:
    a
  2. A Web site that allows users to enter text, such as a comment or a name, and then stores it and laterdisplays it to other users, is potentially vulnerable to a kind of attack what attack is it…
    a)Cross-site scoring scripting
    b) Cross-site request forgery
    c) Cross-site scripting
    d) Two-factor authentication
    e) None of these
    Answer - Click Here:
    c
  3.  Attack which forces a user(end user)to execute unwanted actions on a web application in which he/she
    is currently authenticated…
    a) Cross-site scoring scripting
    b) Cross-site request forgery
    c) Cross-site scripting
    d) Two-factor authentication
    e) None of these
    Answer - Click Here:
    b
  4. Even with two-factor authentication, users are vulnerable to which attacks.
    a) Man-in-the-middle
    b) Cross attack
    c) scripting
    d) Radiant
    e) None of these
    Answer - Click Here:
    a
  5. which factor uses in many applications, where two independent factors are used to identify a user…
    a) Cross-site scripting
    b) Cross-site request forgery
    c) Two-factor authentication
    d) Cross-site scoring scripting
    e) None of these
    Answer - Click Here:
    c
  6.  The system that allows the user to be authenticated once and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication…
    a) OpenID
    b) Sign-on system
    c) Security Assertion Markup Language
    d) Virtual Private Database
    e) None of these
    Answer - Click Here:
    b
  7.  which database is a standard for exchanging authentication and authorization information
    between different security domains, to provide cross-organization …
    a) OpenID
    b) Security Assertion Markup Language
    c) Sign-on system
    d) Virtual Private Database
    e) None of these
    Answer - Click Here:
    c
  8. which id standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years…
    a) OpenID
    b) Single-site system
    c) Security Assertion Markup Language
    d) Virtual Private Database
    e) None of these
    Answer - Click Here:
    a
  9. which database allows a system administrator to associate a function with a relation the function returns a predicate that must be added to any query that uses the relation…
    a)OpenID
    b)Security Assertion Markup Language
    c)Single-site system
    d) Virtual Private Database
    Answer - Click Here:
    d
  10. VPD(virtual private database) provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a mechanism…
    a) row-level authorization
    b) Column-level authentication
    c)  authentication
    d) Authorization security
    e) None of these
    Answer - Click Here:
    a

More MCQs of Networking Internet and Web

  1. Router MCQs
  2. Storage area network MCQs
  3. Networking Important MCQs
  4. Network Security MCQs

  5. Electrical Network Analysis MCQs 

  6. Networking Programming  MCQs

  7. Social Networks MCQs

  8. Network Layers OSI Model MCQs

  9. Digital Communication MCQs

  10. Telecommunication MCQs

  11. Transmission and switching MCQs

  12. Networking topologies Solved MCQs

  13. Computer Network MCQs for Lecturer Test

  14. Mobile and Wireless Network MCQs

  15. Cyber Crime Solved MCQs

  16. Internet Protocols MCQs

  17. Internet MCQs

  18. Web Security and forensics MCQs

  19. Web Security and forensics MCQs 2

  20. Wireless Security MCQs

  21. Datalink layer OSI Model MCQs

  22. Physical Layer OSI Model MCQs

  23. 7 layers OSI Model MCQs

  24. Application Layer MCQs

  25. WIFI MCQs

  26. Internet and Email MCQs

  27. Networking MCQs

  28. Public Service Commission network administrator MCQs

  29. LINUX MCQ’s

  30. Linux File Permissions MCQs

  31. Linux File Permissions MCQs 2

  32. Linux Startup and Shutdown MCQs

  33. Linux process Management MCQs 

    More MCQs of Networking on T4Tutorials

    Computer Science Repeated MCQs Book Download

Add a Comment