1.

Many applications use _________________ where two independent factors are used to identify a user.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingThis question was posed to me during an interview for a job.My question is taken from Application Security in section Database Programming Techniques of Database Management

Answer» RIGHT OPTION is (a) TWO-factor authentication

Easiest explanation - The two factors should not share a common VULNERABILITY.


Discussion

No Comment Found

Related InterviewSolutions