Tag: security

Questions Related to security

You have entered www.google.com in the URL and page is redirected to www.yahoo.com. In this scenario you have been _________________.

  1. IP Spoofed

  2. DNS Spoofed

  3. Email Spoofed

  4. Packet Spoofed


Correct Option: B

How to implement authentication via web.config?

  1. Include the authentication element.

  2. Include the authorization element.

  3. Include the identity element.

  4. Include the deny element.


Correct Option: B

AI Explanation

To implement authentication via the web.config file, you need to include the authorization element.

Option A) Include the authentication element - This option is incorrect because the authentication element is used to configure authentication settings, such as the authentication mode and providers. It is not directly related to implementing authentication.

Option B) Include the authorization element - This option is correct because the authorization element is used to configure authorization settings, such as specifying which users or roles are allowed or denied access to specific resources. It plays a crucial role in implementing authentication by controlling access based on user credentials.

Option C) Include the identity element - This option is incorrect because the identity element is not directly related to implementing authentication. It is used to configure identity settings, such as impersonation and Windows authentication.

Option D) Include the deny element - This option is incorrect because the deny element is used within the authorization element to explicitly deny access to specific users or roles. While it is part of the authorization configuration, it is not the main element for implementing authentication.

The correct answer is Option B) Include the authorization element. This option is correct because the authorization element is used to configure authorization settings, which play a crucial role in implementing authentication.

  1. Cross site Scripting

  2. Injection flaws

  3. Privilege Escalation

  4. None of the above


Correct Option: C
  1. Server side Validation

  2. Client side Validation

  3. None of the above

  4. Both 1 and 2


Correct Option: B
  1. Privilege Escalations

  2. Path traversal Attack

  3. Cross Site Scripting

  4. Buffer overflow


Correct Option: B
  1. an ASCII file that contains an entry for each user

  2. File which is created and maintained by a server of activity performed by it.

  3. short python program that prints the list of all files inside the current directory

  4. File which is created and maintained by the operating system


Correct Option: B