Home Programming Kids Programming Hardware & Software Hardware & Networking APP security Software Education Kids Study MCQS Download OTHERS Multiple Choice Question (MCQ) Multiple Choice Question (MCQ) Login

App Security Multiple Choice Question MCQ

Categories: App Security

1. In _______ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

a) SQL injection

b) SQL

c) Direct

d) Application

Answer: a


2. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a _______ attack.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

Answer: c


3. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

Answer: b


4. Many applications use _______ where two independent factors are used to identify a user.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

Answer: a


5. Even with two-factor authentication, users may still be vulnerable to________ attacks.

a) Radiant

b) Cross attack

c) scripting

d) Man-in-the-middle

Answer: d


6. A single ________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

a) OpenID

b) Sign-on system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: b


7. The __________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.

a) OpenID

b) Sign-on system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: c


8. The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.

a) OpenID

b) Single-site system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: a


9. ________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

a) OpenID

b) Single-site system 

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: d


10. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.

a) Row-level authorization

b) Column-level authentication

c) Row-type authentication

d) Authorization security

Answer: a


11.A ___________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications.

a) Android application

b) Web application

c) PC application

d) Cloud application

Answer: a


12. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a _______attack.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

Answer: c


13. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

Answer: b


14. Many applications use _________ where two independent factors are used to identify a user.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

Answer: a


15. Even with two-factor authentication, users may still be vulnerable to__________attacks.

a) Radiant

b) Cross attack

c) scripting

d) Man-in-the-middle

Answer: d


16. A single _________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

a) OpenID

b) Sign-on system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: b


17. The __________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.

a) OpenID

b) Sign-on system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: c


18. The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.

a) OpenID

b) Single-site system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: a


19. __________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

a) OpenID

b) Single-site system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

Answer: d


20. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a __________ mechanism.

a) Row-level authorization

b) Column-level authentication

c) Row-type authentication

d) Authorization security

Answer: a


App Security Multiple Choice Question MCQ