Tag: security

Questions Related to security

  1. Never rely on the operating system, database, or hardware to handle errors

  2. Your application’s code should always include its own error handler.

  3. All errors generated by internal components such as system calls, database queries, and other internal functions, should be handled by the application’s exception handler

  4. Never implement a generic error page


Correct Option: D
  1. Update the time

  2. Clear them

  3. Update the header

  4. Store IP


Correct Option: B
  1. Use role based access

  2. Enforce authorization on each request

  3. Enforce Business Workflow

  4. All


Correct Option: D
Explanation:

To ensure secure access control, users need to follow some best practices. The answer is option D, which means that all the options mentioned are correct.

Explanation of each option:

A. Use role-based access: This option is correct because role-based access control (RBAC) is a secure practice to control access to resources based on the roles assigned to individual users within an organization. It ensures that users have the necessary access to complete their tasks and restricts access to resources that are not relevant to their role.

B. Enforce authorization on each request: This option is correct because enforcing authorization on each request helps to verify that the user has the necessary privileges to access the requested resource. Authorization ensures that users only access the resources that they need to complete their tasks and nothing more.

C. Enforce Business Workflow: This option is correct because enforcing business workflow ensures that the access granted to users is in alignment with the business processes. By enforcing business workflow, organizations can minimize the risk of unauthorized access to resources and ensure that the access granted is relevant to the user's role.

D. All: This option is correct because all the options mentioned are secure practices for access control. Using role-based access, enforcing authorization on each request, and enforcing business workflow, all contribute towards ensuring secure access control.

Therefore, the correct answer is: D. All.

  1. Horizontal Privielege Escalation

  2. Vertical Privielege Escalation

  3. Cross functional escalation

  4. Session Hijacking


Correct Option: A
  1. A symmetric algorithm provides better access control.

  2. A symmetric algorithm is a faster process.

  3. A symmetric algorithm provides nonrepudiation of delivery.

  4. A symmetric algorithm is more difficult to implement


Correct Option: B
  1. Random numbers

  2. A long password

  3. DES

  4. A FIPS - or EAL-certified algorithm


Correct Option: D
  1. FBI agent

  2. A website that allows you to masquerade your identity

  3. Tool that allows you to do phising

  4. Tool that allows you to do vishing


Correct Option: B
  1. Wear a mask over their face while they hack

  2. Change their dressing pattern, modify their appearance

  3. Using methods like phising

  4. Piggybacking into unsecured wireless


Correct Option: D
  1. Distribute virus through emails

  2. Distribute worms through emails

  3. Use botnets

  4. Phising


Correct Option: C