a) Row-level authorization b) Column-level authentication c) ...
View Question______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
a) OpenID b) Single-site system c) Security Assertion Markup Language ...
View QuestionThe __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.
a) OpenID b) Single-site system c) Security Assertion Markup Language (SAML) d) Virtual Private Database (VPD)
View QuestionThe ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.
a) OpenID b) Sign-on system c) Security Assertion Markup Language (SAML)
View QuestionA single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
a) OpenID b) Sign-on system c) Security Assertion Markup Language ...
View QuestionEven with two-factor authentication, users may still be vulnerable to_____________attacks.
a) Radiant b) Cross attack c) scripting
View QuestionMany applications use _________________ where two independent factors are used to identify a user.
a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting d) Cross-site ...
View Question_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
a) Two-factor authentication b) Cross-site request forgery c) Cross-site scripting
View QuestionA Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.
a) Two-factor authentication b) Cross-site request forgery c) ...
View QuestionIn _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
a) SQL injection b) SQL c) Direct d) Application
View Question