Tag: security

Questions Related to security

  1. Session Fixation Attack

  2. Brute force attack

  3. Insecure Direct Object Reference

  4. Injection Flaws


Correct Option: B
Explanation:

To answer this question, the user needs to know about common types of attacks on web applications and their characteristics.

Option A: Session Fixation Attack, which is also known as a session hijacking attack, involves an attacker fixing the session identifier of a user to gain unauthorized access to the user's account. This option is incorrect because it does not match the given scenario.

Option B: Brute force attack is the correct answer. A brute force attack is a common type of attack where an automated process tries a large number of possible values to crack a password or find a key. This type of attack is often used to gain unauthorized access to a system or application. This option matches the given scenario.

Option C: Insecure Direct Object Reference is a type of attack where an attacker can access an unauthorized resource by manipulating an object reference. This option is incorrect because it does not match the given scenario.

Option D: Injection Flaws are a type of attack where an attacker sends malicious input to an application to exploit a vulnerability and gain unauthorized access to the system. This option is incorrect because it does not match the given scenario.

Therefore, the correct answer is:

The Answer is: B. Brute force attack.

  1. A scanned copy of a paper certificate document is called a digital certificate

  2. Voice signal converted from analog to digital signal during transmission on a PSTN network

  3. An encryption mechanism for confirming the message sender and integrity of the message received

  4. none of the above


Correct Option: C
Explanation:

To solve this question, the user needs to have an understanding of digital certificates.

Option A: This option is incorrect. A digital certificate is not a scanned copy of a paper certificate. A digital certificate is an electronic document that verifies the identity of the certificate holder.

Option B: This option is incorrect. Voice signal conversion from analog to digital signal during transmission on a public switched telephone network (PSTN) is not related to digital certificates.

Option C: This option is correct. A digital certificate is an encryption mechanism that confirms the message sender and integrity of the message received. It contains information about the identity of the certificate holder, including their public key.

Option D: This option is incorrect. Option C is the correct statement.

Therefore, the answer is: C

  1. Absolutely Correct Assumption

  2. Absolutely Incorrect assumption

  3. Partially Correct Assumption

  4. Possibly correct Assumption


Correct Option: C
Explanation:

The answer to this question is C. Partially Correct Assumption.

Explanation:

The cloud provider will take care of the physical security of the infrastructure, such as the data centers and the network. However, the responsibility for application security still lies with the organization that owns the application. This includes things like ensuring that the application is coded securely, that it is properly configured, and that it is regularly updated with security patches.

Therefore, the assumption that security will entirely be the service provider's responsibility is partially correct. The service provider will take care of some aspects of security, but the organization still has a responsibility to ensure the security of their application.

Here is a table that summarizes the different aspects of security that are the responsibility of the cloud provider and the organization:

Aspect of Security Responsibility
Physical security of the infrastructure Cloud provider
Network security Cloud provider
Application security Organization
Data security Organization
Compliance with regulations Organization
  1. It establishes traceability of every action to the doer

  2. In some critical situations it should be impossible to deny an action

  3. It is a forensic analysis mechanism

  4. All of the above


Correct Option: D
Explanation:

Non-repudiation is a very desirable trait because it ensures that an action or transaction cannot be denied or disputed by the parties involved. Let's go through each option to understand why it is correct or incorrect:

Option A) It establishes traceability of every action to the doer - This option is correct because non-repudiation ensures that every action can be traced back to the person who performed it. This helps in establishing accountability and responsibility.

Option B) In some critical situations, it should be impossible to deny an action - This option is correct because non-repudiation prevents the ability to deny or dispute an action, especially in critical situations. This is important to ensure trust and reliability in such scenarios.

Option C) It is a forensic analysis mechanism - This option is incorrect. While non-repudiation can be used as a tool in forensic analysis, it is not the primary purpose of non-repudiation. Non-repudiation primarily focuses on preventing denial of actions or transactions.

Option D) All of the above - This option is correct because all the statements mentioned in options A and B are true. Non-repudiation establishes traceability, prevents denial in critical situations, and can be used in forensic analysis.

Therefore, the correct answer is D) All of the above. Non-repudiation is desirable because it establishes traceability, prevents denial in critical situations, and can be used as a forensic analysis mechanism.

  1. Requirements Analysis

  2. Vulnerability Assessment

  3. Code Review

  4. All of the above


Correct Option: D
  1. access control should be handled by the application and database layers

  2. Always include current authenticated username as part of the query.

  3. Never rely on presentation layer to restrict values submitted by the user

  4. All the above


Correct Option: D
  1. Data is injected from application into query

  2. The data is used to dynamically construct a SQL query

  3. when sql query is executed injected application code from the database.

  4. None of these


Correct Option: B
  1. If the request does not contain a nonce that proves its provenance

  2. The application acts on an HTTP request without verifying that the request was made with the user's consent

  3. A Web application uses session cookies

  4. All the above


Correct Option: D
  1. Sql Injection attack

  2. Denial of Service attack

  3. CSRF attack

  4. None of these


Correct Option: B
  1. Monitoring UDP session

  2. Monitoring TCP sessions

  3. Taking over UDP sessions

  4. Taking over TCP sessions


Correct Option: D