Carlos Veliz
Quiz von , erstellt am more than 1 year ago

Authentication and Authorization

178
0
0
Carlos Veliz
Erstellt von Carlos Veliz vor etwa 9 Jahre
Schließen

Authentication and Authorization

Frage 1 von 10

1

Which of the following statements is not part of the types of authentication mechanisms?

Wähle eine der folgenden:

  • HTTP Basic Authentication

  • Form-Based Authentication

  • Authentication 802.1x

  • Client/Server Mutual Authentication

Erklärung

Frage 2 von 10

1

Cual de los siguientes enunciados no corresponde a los pasos de una autenticación basica?

Wähle eine der folgenden:

  • Requests a protected resource

  • Request username password

  • Redirect to login page

  • Returns request resource

  • Sends username password

Erklärung

Frage 3 von 10

1

Indicate whether the following definition is true or false for form-based authentication:
"SSL can be added to part or whole of the web application"

Wähle eine der folgenden:

  • True

  • False

Erklärung

Frage 4 von 10

1

It is not part of the job overview of Kerberos:

Wähle eine der folgenden:

  • Key Distribution Centre in Kerberos stores account information and client passwords

  • Working proccess is invisible to the user

  • This mechanism issues tickets containing user identity, encrypted password, encrypted data

  • Client authentication ensures that the users are legitimate or not

Erklärung

Frage 5 von 10

1

It is not a way to prevent Web-based enumeration attack:

Wähle eine der folgenden:

  • Lock out targeted account access after a certain restricted failed attempts

  • Web applications need to respond with similar error messages to all authentication failures

  • Analyze URLs and ther responses during security testinf to authentication failures and prevent unnecessary information leakage

  • Analyze Web page titles and their responses during authentication failures and prevent unnecesaary information leakage

Erklärung

Frage 6 von 10

1

Authorization is the proccess that control access rights of principals to system resources that include:

Wähle eine der folgenden:

  • Access to users

  • Access to proccess

  • Access to machines

  • All of the above

  • None of the above

Erklärung

Frage 7 von 10

1

Which is the fifth step in implementing authorization?

Wähle eine der folgenden:

  • Defining roles to users

  • check for user authentication for the application

  • Apply the constrains which are accessible by role

  • Define security roles of an application to roles defined in memory realm

Erklärung

Frage 8 von 10

1

It is not part of the access control model:

Wähle eine der folgenden:

  • System Domain

  • AWT

  • Printer

  • Database Server

  • File I/O

Erklärung

Frage 9 von 10

1

Which of the following statements is not part of the principles of least privilege?

Wähle eine der folgenden:

  • User account should have enongh privileges according to their task

  • Evaluate and implement code access permissions

  • Save sensitive files with random names and clean temporay files

  • Enable web applications access to database through limited accounts only

  • Avoid Web application servers running at privileged accounst such as administrador, root, sysman, sa, etc.

Erklärung

Frage 10 von 10

1

Which of the following is not a best practice in the management of sessions?

Wähle eine der folgenden:

  • Make use of SSL

  • Do not add sensitive data in security token

  • Impose concurrent login limits

  • Regenerate session IDs upon privilege changes

  • A user has access to resources based on the role assigned

Erklärung