Tag: security
Questions Related to security
-
Java sand box environment provides protection against decompilation
-
Java is compiled into ELF binaries and cannot be decompiled
-
Java byte code can always be decompiled, code obfuscators can make the reverse engineering process more time confusing but cannot prevent it
-
Java is difficult to decompile because the Just-In-Time compiler automatically perform string encryption by default
-
Equivalent to normal users
-
Less than those of normal users as all administrators are trustworthy
-
No authentication is required for administrators
-
Greater than those of normal users
-
Only be used on administrator accounts to ensure continuous access to users
-
Only be used on user accounts to ensure that administrators are not locked out of the application
-
Only be used when there is a secure process to unlock the account
-
None of the above
-
Cannot be treated as a secure practice
-
Is a good way to hide passwords from hackers
-
Is perfectly fine for internal applications
-
Is perfectly fine for external user facing applications
-
Commercial applications
-
Custom built applications
-
In house developed applications
-
All of the above
-
Ensure that the data has not been tampered with
-
Ensure that the session is valid
-
Ensure that the user is valid
-
All of the above
-
The configuration management
-
The session management
-
The change management process
-
The authorization process
-
SOAP and SAML
-
SOAP and HTTP
-
SSL and SOAP
-
All
-
A mechanism that requires only a password
-
Basic authentication
-
2/3 factor authentication
-
A mechanism with no lock-out, to prevent accidentally denying legitimate access
-
Page Scope
-
Session Scope
-
Request Scope
-
Application Scope