Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Many applications use _________________ where two independent factors are used to identify a user.

a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting

Answer: a
Explanation: The two factors should not share a common vulnerability.

Join The Discussion