Tag: security

Questions Related to security

  1. Java sand box environment provides protection against decompilation

  2. Java is compiled into ELF binaries and cannot be decompiled

  3. Java byte code can always be decompiled, code obfuscators can make the reverse engineering process more time confusing but cannot prevent it

  4. Java is difficult to decompile because the Just-In-Time compiler automatically perform string encryption by default


Correct Option: C
  1. Equivalent to normal users

  2. Less than those of normal users as all administrators are trustworthy

  3. No authentication is required for administrators

  4. Greater than those of normal users


Correct Option: D
  1. Only be used on administrator accounts to ensure continuous access to users

  2. Only be used on user accounts to ensure that administrators are not locked out of the application

  3. Only be used when there is a secure process to unlock the account

  4. None of the above


Correct Option: C
  1. Cannot be treated as a secure practice

  2. Is a good way to hide passwords from hackers

  3. Is perfectly fine for internal applications

  4. Is perfectly fine for external user facing applications


Correct Option: A
  1. Commercial applications

  2. Custom built applications

  3. In house developed applications

  4. All of the above


Correct Option: D
  1. Ensure that the data has not been tampered with

  2. Ensure that the session is valid

  3. Ensure that the user is valid

  4. All of the above


Correct Option: A

A successful forced browsing attack indicates a vulnerability in

  1. The configuration management

  2. The session management

  3. The change management process

  4. The authorization process


Correct Option: D

AI Explanation

To answer this question, let's go through each option to understand why it is correct or incorrect:

Option A) The configuration management - This option is incorrect because forced browsing attacks do not directly target configuration management. Forced browsing attacks involve accessing unauthorized directories or files by manipulating URLs or paths.

Option B) The session management - This option is incorrect because forced browsing attacks do not directly target session management. Forced browsing attacks focus on accessing unauthorized information, not manipulating session data.

Option C) The change management process - This option is incorrect because forced browsing attacks do not directly target the change management process. Forced browsing attacks involve accessing unauthorized directories or files, rather than exploiting weaknesses in the change management process.

Option D) The authorization process - This option is correct because a successful forced browsing attack indicates a vulnerability in the authorization process. Forced browsing attacks involve accessing unauthorized directories or files by manipulating URLs or paths. If the authorization process is not properly implemented, attackers can bypass access controls and gain unauthorized access to sensitive information.

The correct answer is D) The authorization process. This option is correct because forced browsing attacks exploit vulnerabilities in the authorization process, allowing unauthorized access to protected resources.

  1. SOAP and SAML

  2. SOAP and HTTP

  3. SSL and SOAP

  4. All


Correct Option: D
  1. A mechanism that requires only a password

  2. Basic authentication

  3. 2/3 factor authentication

  4. A mechanism with no lock-out, to prevent accidentally denying legitimate access


Correct Option: C
  1. Page Scope

  2. Session Scope

  3. Request Scope

  4. Application Scope


Correct Option: B