Tag: security

Questions Related to security

  1. Java sand box environment provides protection against decompilation

  2. Java is compiled into ELF binaries and cannot be decompiled

  3. Java byte code can always be decompiled, code obfuscators can make the reverse engineering process more time confusing but cannot prevent it

  4. Java is difficult to decompile because the Just-In-Time compiler automatically perform string encryption by default


Correct Option: C
  1. Equivalent to normal users

  2. Less than those of normal users as all administrators are trustworthy

  3. No authentication is required for administrators

  4. Greater than those of normal users


Correct Option: D
  1. Only be used on administrator accounts to ensure continuous access to users

  2. Only be used on user accounts to ensure that administrators are not locked out of the application

  3. Only be used when there is a secure process to unlock the account

  4. None of the above


Correct Option: C
  1. Cannot be treated as a secure practice

  2. Is a good way to hide passwords from hackers

  3. Is perfectly fine for internal applications

  4. Is perfectly fine for external user facing applications


Correct Option: A
  1. Commercial applications

  2. Custom built applications

  3. In house developed applications

  4. All of the above


Correct Option: D
  1. Ensure that the data has not been tampered with

  2. Ensure that the session is valid

  3. Ensure that the user is valid

  4. All of the above


Correct Option: A
  1. The configuration management

  2. The session management

  3. The change management process

  4. The authorization process


Correct Option: D
  1. SOAP and SAML

  2. SOAP and HTTP

  3. SSL and SOAP

  4. All


Correct Option: D
  1. A mechanism that requires only a password

  2. Basic authentication

  3. 2/3 factor authentication

  4. A mechanism with no lock-out, to prevent accidentally denying legitimate access


Correct Option: C
  1. Page Scope

  2. Session Scope

  3. Request Scope

  4. Application Scope


Correct Option: B