App Security Multiple Choice Question MCQ
Categories: App Security
1. In _______ attacks, the attacker manages to get an application to execute an SQL query created by the attacker. a) SQL injection b) SQL c) Direct d) Application Answer: a 2. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a _______ attack. a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting d) Cross-site scoring scripting Answer: c 3. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting d) Cross-site scoring scripting Answer: b 4. Many applications use _______ where two independent factors are used to identify a user. a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting d) Cross-site scoring scripting Answer: a 5. Even with two-factor authentication, users may still be vulnerable to________ attacks. a) Radiant b) Cross attack c) scripting d) Man-in-the-middle Answer: d 6. A single ________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication. a) OpenID b) Sign-on system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: b 7. The __________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on. a) OpenID b) Sign-on system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: c 8. The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years. a) OpenID b) Single-site system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: a 9. ________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. a) OpenID b) Single-site system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: d 10. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism. a) Row-level authorization b) Column-level authentication c) Row-type authentication d) Authorization security Answer: a 11.A ___________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications. a) Android application b) Web application c) PC application d) Cloud application Answer: a 12. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a _______attack. a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting d) Cross-site scoring scripting Answer: c 13. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting d) Cross-site scoring scripting Answer: b 14. Many applications use _________ where two independent factors are used to identify a user. a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting d) Cross-site scoring scripting Answer: a 15. Even with two-factor authentication, users may still be vulnerable to__________attacks. a) Radiant b) Cross attack c) scripting d) Man-in-the-middle Answer: d 16. A single _________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication. a) OpenID b) Sign-on system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: b 17. The __________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on. a) OpenID b) Sign-on system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: c 18. The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years. a) OpenID b) Single-site system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: a 19. __________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. a) OpenID b) Single-site system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD) Answer: d 20. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a __________ mechanism. a) Row-level authorization b) Column-level authentication c) Row-type authentication d) Authorization security Answer: a