a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
Answer: a
Explanation: The two factors should not share a common vulnerability.
Related Posts
Which one of the following is not a secondary storage?
The surface area of a tape is ________ the surface area of a disk.
Which of the following is the oldest database model?
The replacement of a bad block generally is not totally automatic because
Which of the following are the process of selecting the data storage and data access characteristics of the database?
A magneto-optic disk is :
During recovery from a failure
Join The Discussion