100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CSE 445 FINAL EXAM QUESTIONS WITH 100% CORRECT ANSWERS 2025 LATEST UPDATE

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
05-02-2025
Written in
2024/2025

CSE 445 FINAL EXAM QUESTIONS WITH 100% CORRECT ANSWERS 2025 LATEST UPDATE Which of the following is true about confidentiality of data? A) It's a measure that ensures only authorized users can access data B) It's a measure that ensures data is not tampered during the transmission C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data D) All of the above - Answer-B) It's a measure that ensures data is not tampered during the transmission Which of the following is true about safety of data? A) It's a measure that ensures only authorized users can access data B) ensures non-occurrence of catastrophic consequence on the environment (human life lost, economic impact, etc.) C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data D) All of the above - Answer-B) ensures non-occurrence of catastrophic consequence on the environment (human life lost, economic impact, etc.) Which of the following is true about vulnerability of data? A) It's a measure that ensures only authorized users can access data B) It's a measure that ensures data is not tampered during the transmission C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data D) All of the above - Answer-C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data What dependability functions are implemented in WCF? - Answer-security and reliability Where are the credentials saved in the built-in account management (offered by the pages in the "Account" folder) of ASP .Net application? - Answer-in a database how is the Windows-based security implemented in a Web application? - Answer-all access to a web application or web service must go through IIS, which assigns every request an access token. the access token enables the Windows OS to perform ACL (access control list) checks on resources targeted by the request. How does the Windows security mechanism work in Web application security control? - Answer-It compares the received credential with the credential saved in Windows's user accounts. In Windows-based security system, the access control list is stored in... - Answer-the Windows operating system. Windows security can be used to control user access to a Website. This security mechanism can be best applied to the users of - Answer-corporate intranet applications how is the form-based security implemented in a Web application? - Answer-it used the Wg file to define the detailed security policies. the section can be used to define authentication and authorization to a web application. What is (are) the problem(s) associated with the standard Windows Forms Security mechanism? - Answer-- passwords are stored in clear text - sequential comparisons of user name and password - unmanageable if accessibility needs to be changed frequently Where can the credential be possibly saved if the Forms security is used? - Answer-- In Web.Config file. - In a user-defined XML file. - In a user-defined database. In Forms security, if login is successful, what are the possible solutions to store the user-entered credential? Select all that apply. - Answer-- As a cookie on client side. - In a hidden area in the client's web browser. By default, the cookies used in the Forms-based Security are protected by... - Answer-- using encryption to prevent reading. - using digital signature to prevent modification. What are the main roles of IIS in Web application security control? - Answer-- It creates an access token and passes it to ASP .Net or to Windows for security check - It blocks IP address and domain that are not permitted What security mechanism(s) does IIS support? - Answer-- access control list - IP address restrictions - domain name restrictions - encrypted HTTP connections

Show more Read less
Institution
CSE 445
Course
CSE 445










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSE 445
Course
CSE 445

Document information

Uploaded on
February 5, 2025
Number of pages
22
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSE 445 FINAL EXAM QUESTIONS
WITH 100% CORRECT ANSWERS
2025 LATEST UPDATE

Which of the following is true about confidentiality of data?

A) It's a measure that ensures only authorized users can access data
B) It's a measure that ensures data is not tampered during the transmission
C) It's a measure that ensures programs that generate data does not have any errors so
that attacks can access the data
D) All of the above - Answer-B) It's a measure that ensures data is not tampered during
the transmission

Which of the following is true about safety of data?

A) It's a measure that ensures only authorized users can access data
B) ensures non-occurrence of catastrophic consequence on the environment (human
life lost, economic impact, etc.)
C) It's a measure that ensures programs that generate data does not have any errors so
that attacks can access the data
D) All of the above - Answer-B) ensures non-occurrence of catastrophic consequence
on the environment (human life lost, economic impact, etc.)

Which of the following is true about vulnerability of data?

A) It's a measure that ensures only authorized users can access data
B) It's a measure that ensures data is not tampered during the transmission
C) It's a measure that ensures programs that generate data does not have any errors so
that attacks can access the data
D) All of the above - Answer-C) It's a measure that ensures programs that generate
data does not have any errors so that attacks can access the data

What dependability functions are implemented in WCF? - Answer-security and reliability

Where are the credentials saved in the built-in account management (offered by the
pages in the "Account" folder) of ASP .Net application? - Answer-in a database

,how is the Windows-based security implemented in a Web application? - Answer-all
access to a web application or web service must go through IIS, which assigns every
request an access token. the access token enables the Windows OS to perform ACL
(access control list) checks on resources targeted by the request.

How does the Windows security mechanism work in Web application security control? -
Answer-It compares the received credential with the credential saved in Windows's user
accounts.

In Windows-based security system, the access control list is stored in... - Answer-the
Windows operating system.

Windows security can be used to control user access to a Website. This security
mechanism can be best applied to the users of - Answer-corporate intranet applications

how is the form-based security implemented in a Web application? - Answer-it used the
Web.config file to define the detailed security policies. the system.web section can be
used to define authentication and authorization to a web application.

What is (are) the problem(s) associated with the standard Windows Forms Security
mechanism? - Answer-- passwords are stored in clear text
- sequential comparisons of user name and password
- unmanageable if accessibility needs to be changed frequently

Where can the credential be possibly saved if the Forms security is used? - Answer-- In
Web.Config file.
- In a user-defined XML file.
- In a user-defined database.

In Forms security, if login is successful, what are the possible solutions to store the
user-entered credential? Select all that apply. - Answer-- As a cookie on client side.
- In a hidden area in the client's web browser.

By default, the cookies used in the Forms-based Security are protected by... - Answer--
using encryption to prevent reading.
- using digital signature to prevent modification.

What are the main roles of IIS in Web application security control? - Answer-- It creates
an access token and passes it to ASP .Net or to Windows for security check
- It blocks IP address and domain that are not permitted

What security mechanism(s) does IIS support? - Answer-- access control list
- IP address restrictions
- domain name restrictions
- encrypted HTTP connections

, Web.config file in ASP.Net application is used for... - Answer-authentication and
authorization

How is the authorization applied to a resource (a page) in ASP .Net application? -
Answer-Authorization information is stored in the Web.config file in the sub directory in
which the page resides.

What are the main problems of storing the credentials in Web.config file? - Answer-
Unmanageable if the number of users is large.
Sequential comparisons of passwords.

What do you do if you want to use your own file for storing the credentials, instead of
using Web.conf? - Answer-Write your own code to handle the access control.

The <authorization> element in a Web.cong file consists of a list of <allow> and <deny>
elements.... - Answer-The elements must be specifically ordered according to
authorization requirement.

Which of the following sequences does not make sense logically or semantically? -
Answer-<deny users="*"/> <allow users="bob"/>

What is the strongest security option in the Forms-based Web security (the most secure
mode)? - Answer-The clause <identity impersonate ="..." /> does not appear in
Web.config file.

In what configuration setting will ASP .Net use the security token passed to it by IIS? -
Answer-<identity impersonate = "false">

Why do you need to create your own machine key in if your ASP .Net application is
hosted in a server farm environment? - Answer-A server farm does not have a unique
machine key

Where do you use the secure machine key generated for your ASP .Net application? -
Answer-In the Web.config file, in the element system.web

What features does Windows Communication Foundation support? - Answer-- Platform-
independent communication.
- WS-Security and WS-ReliableMessaging.

What is (are) the major dependability feature(s) added into the Windows
Communications Foundations? - Answer-- WS-Security
- Reliable Sessions (WS-R)
- Interoperability (WS-I)

what is WS-Specification?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Scholarsstudyguide nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
792
Member since
3 year
Number of followers
475
Documents
15431
Last sold
1 day ago
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.9

164 reviews

5
87
4
21
3
26
2
6
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions