Tag: security

Questions Related to security

  1. Java sand box environment provides protection against decompilation

  2. Java is compiled into ELF binaries and cannot be decompiled

  3. Java byte code can always be decompiled, code obfuscators can make the reverse engineering process more time confusing but cannot prevent it

  4. Java is difficult to decompile because the Just-In-Time compiler automatically perform string encryption by default


Correct Option: C

Requirements for administrator authentication should be

  1. Equivalent to normal users

  2. Less than those of normal users as all administrators are trustworthy

  3. No authentication is required for administrators

  4. Greater than those of normal users


Correct Option: D

AI Explanation

To answer this question, you need to understand the concept of administrator authentication.

Option A) Equivalent to normal users - This option is incorrect because administrators typically have higher privileges and access to sensitive information or system settings. Therefore, their authentication requirements should be greater than those of normal users.

Option B) Less than those of normal users as all administrators are trustworthy - This option is incorrect because even though administrators are trusted individuals, it is still important to have strong authentication measures in place to prevent unauthorized access or misuse of administrative privileges.

Option C) No authentication is required for administrators - This option is incorrect because administrators should still go through some form of authentication to ensure the security of the system and its resources.

Option D) Greater than those of normal users - This option is correct because administrators should have stronger authentication requirements compared to normal users. This can include additional factors such as multi-factor authentication, stricter password policies, or even biometric authentication to ensure the security and integrity of the system.

The correct answer is Option D. This option is correct because administrators typically require greater authentication measures to protect sensitive information and maintain the security of the system.

  1. Only be used on administrator accounts to ensure continuous access to users

  2. Only be used on user accounts to ensure that administrators are not locked out of the application

  3. Only be used when there is a secure process to unlock the account

  4. None of the above


Correct Option: C
  1. Cannot be treated as a secure practice

  2. Is a good way to hide passwords from hackers

  3. Is perfectly fine for internal applications

  4. Is perfectly fine for external user facing applications


Correct Option: A

Configuration Management Security principles apply to

  1. Commercial applications

  2. Custom built applications

  3. In house developed applications

  4. All of the above


Correct Option: D
  1. Ensure that the data has not been tampered with

  2. Ensure that the session is valid

  3. Ensure that the user is valid

  4. All of the above


Correct Option: A
  1. The configuration management

  2. The session management

  3. The change management process

  4. The authorization process


Correct Option: D
  1. SOAP and SAML

  2. SOAP and HTTP

  3. SSL and SOAP

  4. All


Correct Option: D
  1. A mechanism that requires only a password

  2. Basic authentication

  3. 2/3 factor authentication

  4. A mechanism with no lock-out, to prevent accidentally denying legitimate access


Correct Option: C
  1. Page Scope

  2. Session Scope

  3. Request Scope

  4. Application Scope


Correct Option: B