1.

Even with two-factor authentication, users may still be vulnerable to_____________attacks.(a) Radiant(b) Cross attack(c) scripting(d) Man-in-the-middleThis question was posed to me during an interview.I'd like to ask this question from Application Security topic in portion Database Programming Techniques of Database Management

Answer»

The correct answer is (d) Man-in-the-middle

Easiest explanation - In such ATTACKS, a user attempting to connect to the application is DIVERTED to a fake Web site, which accepts the password from the user, and USES it immediately to AUTHENTICATE to the original application.



Discussion

No Comment Found

Related InterviewSolutions