Database Management Systems Mcqs

Page No. 30

The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.


aOpenID


bSingle-site system


cSecurity Assertion Markup Language (SAML)


dVirtual Private Database (VPD)


View Answer OpenID

The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.


aOpenID


bSign-on system


cSecurity Assertion Markup Language (SAML)


dVirtual Private Database (VPD)



A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.


aOpenID


bSign-on system


cSecurity Assertion Markup Language (SAML)


dVirtual Private Database (VPD)


View Answer Sign-on system

Even with two-factor authentication, users may still be vulnerable to_____________attacks.


aRadiant


bCross attack


cscripting


dMan-in-the-middle


View Answer Man-in-the-middle

Many applications use _________________ where two independent factors are used to identify a user.


aTwo-factor authentication


bCross-site request forgery


cCross-site scripting


dCross-site scoring scripting



_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.


aTwo-factor authentication


bCross-site request forgery


cCross-site scripting


dCross-site scoring scripting



A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.


aTwo-factor authentication


bCross-site request forgery


cCross-site scripting


dCross-site scoring scripting


View Answer Cross-site scripting

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.


aSQL injection


bSQL


cDirect


dApplication


View Answer SQL injection

The elements of an array are stored successively in memory cells because


aBy this way computer can keep track only the address of the first element and the addresses of other elements can be calculated


bThe architecture of computer memory does not allow arrays to store other than serially


cAll of the mentioned


dNone of the mentioned



Each array declaration need not give, implicitly or explicitly, the information about


aThe name of array


bThe data type of array


cThe first data from the set to be stored


dThe index set of the array



Goto Page No.

Page 30 of 101

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan