Tag: security

Questions Related to security

Which of the following is used to ensure availability in software?

  1. Encryption

  2. Hashing

  3. Recovery

  4. Redundancy


Correct Option: C
  1. Fail-over to a higher-availability service

  2. Vary its response times to subsequent requests

  3. Disconnect the affected connectivity point

  4. Fail-over to a hot standby


Correct Option: B
  1. Design for survivability

  2. Design for secure failure

  3. Design for controllability

  4. Design for redundancy


Correct Option: A
  1. Security management interfaces

  2. Secure configuration management

  3. Application container

  4. Security manager


Correct Option: A
  1. Passwords

  2. Factors

  3. Credentials

  4. Identities


Correct Option: B
  1. Detection of some attacks

  2. Configuration and performance

  3. Flexible policy enforcement

  4. Specialized security knowledge


Correct Option: B
  1. C

  2. Java

  3. .NET

  4. Managed Code


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge about security concerns related to programming languages.

Authentication and session management are security concerns that are relevant to web applications. They ensure that users are who they claim to be and that the information stored on the server is secure.

Now, let's go through each option and explain why it is right or wrong:

A. Java: This option is correct. Java is a popular programming language for web applications, and it has built-in features for authentication and session management. Java web applications use a session ID to identify each user's session, and the server uses this ID to retrieve the user's session data.

B. .NET: This option is also correct. .NET is a framework for building web applications, and it includes features for authentication and session management. .NET web applications use cookies to store session information, and the server retrieves this information using the session ID in the cookie.

C. Managed Code: This option is too broad to be correct or incorrect. Managed code refers to code that is executed by a runtime environment, such as Java or .NET. While both Java and .NET use managed code, this option does not specify which language or framework is being referred to.

D. C: This option is incorrect. C is a programming language that is not commonly used for web applications, and it does not have built-in features for authentication and session management. While it is possible to implement these features in C, it would require more manual coding than using a language like Java or .NET.

The Answer is: A or B

  1. Layer1, as a telephone number represents a series of electrical impulses

  2. Layer 3, because a telephone number describes communication between different networks

  3. This depends on the nature of the telephony system (for instance, Voice-over-IP versus public switched telephony network (PSTN))

  4. None, as the telephone system is a circuit-based network and the OSI system only describes packet-switched networks


Correct Option: C
  1. A denial-of-service attack on servers on a network

  2. Hacking into a router

  3. A virus outbreak saturating network capacity

  4. A man-in-the-middle attack


Correct Option: C