InterviewSolution
Saved Bookmarks
| 1. |
Many applications use _________________ where two independent factors are used to identify a user.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingThis question was posed to me during an interview for a job.My question is taken from Application Security in section Database Programming Techniques of Database Management |
|
Answer» RIGHT OPTION is (a) TWO-factor authentication Easiest explanation - The two factors should not share a common VULNERABILITY. |
|