100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSE 445 FINAL EXAM QUESTIONS WITH 100% CORRECT ANSWERS 2025 LATEST UPDATE

Beoordeling
-
Verkocht
-
Pagina's
22
Cijfer
A+
Geüpload op
05-02-2025
Geschreven in
2024/2025

CSE 445 FINAL EXAM QUESTIONS WITH 100% CORRECT ANSWERS 2025 LATEST UPDATE Which of the following is true about confidentiality of data? A) It's a measure that ensures only authorized users can access data B) It's a measure that ensures data is not tampered during the transmission C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data D) All of the above - Answer-B) It's a measure that ensures data is not tampered during the transmission Which of the following is true about safety of data? A) It's a measure that ensures only authorized users can access data B) ensures non-occurrence of catastrophic consequence on the environment (human life lost, economic impact, etc.) C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data D) All of the above - Answer-B) ensures non-occurrence of catastrophic consequence on the environment (human life lost, economic impact, etc.) Which of the following is true about vulnerability of data? A) It's a measure that ensures only authorized users can access data B) It's a measure that ensures data is not tampered during the transmission C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data D) All of the above - Answer-C) It's a measure that ensures programs that generate data does not have any errors so that attacks can access the data What dependability functions are implemented in WCF? - Answer-security and reliability Where are the credentials saved in the built-in account management (offered by the pages in the "Account" folder) of ASP .Net application? - Answer-in a database how is the Windows-based security implemented in a Web application? - Answer-all access to a web application or web service must go through IIS, which assigns every request an access token. the access token enables the Windows OS to perform ACL (access control list) checks on resources targeted by the request. How does the Windows security mechanism work in Web application security control? - Answer-It compares the received credential with the credential saved in Windows's user accounts. In Windows-based security system, the access control list is stored in... - Answer-the Windows operating system. Windows security can be used to control user access to a Website. This security mechanism can be best applied to the users of - Answer-corporate intranet applications how is the form-based security implemented in a Web application? - Answer-it used the Wg file to define the detailed security policies. the section can be used to define authentication and authorization to a web application. What is (are) the problem(s) associated with the standard Windows Forms Security mechanism? - Answer-- passwords are stored in clear text - sequential comparisons of user name and password - unmanageable if accessibility needs to be changed frequently Where can the credential be possibly saved if the Forms security is used? - Answer-- In Web.Config file. - In a user-defined XML file. - In a user-defined database. In Forms security, if login is successful, what are the possible solutions to store the user-entered credential? Select all that apply. - Answer-- As a cookie on client side. - In a hidden area in the client's web browser. By default, the cookies used in the Forms-based Security are protected by... - Answer-- using encryption to prevent reading. - using digital signature to prevent modification. What are the main roles of IIS in Web application security control? - Answer-- It creates an access token and passes it to ASP .Net or to Windows for security check - It blocks IP address and domain that are not permitted What security mechanism(s) does IIS support? - Answer-- access control list - IP address restrictions - domain name restrictions - encrypted HTTP connections

Meer zien Lees minder
Instelling
CSE 445
Vak
CSE 445










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CSE 445
Vak
CSE 445

Documentinformatie

Geüpload op
5 februari 2025
Aantal pagina's
22
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CSE 445 FINAL EXAM QUESTIONS
WITH 100% CORRECT ANSWERS
2025 LATEST UPDATE

Which of the following is true about confidentiality of data?

A) It's a measure that ensures only authorized users can access data
B) It's a measure that ensures data is not tampered during the transmission
C) It's a measure that ensures programs that generate data does not have any errors so
that attacks can access the data
D) All of the above - Answer-B) It's a measure that ensures data is not tampered during
the transmission

Which of the following is true about safety of data?

A) It's a measure that ensures only authorized users can access data
B) ensures non-occurrence of catastrophic consequence on the environment (human
life lost, economic impact, etc.)
C) It's a measure that ensures programs that generate data does not have any errors so
that attacks can access the data
D) All of the above - Answer-B) ensures non-occurrence of catastrophic consequence
on the environment (human life lost, economic impact, etc.)

Which of the following is true about vulnerability of data?

A) It's a measure that ensures only authorized users can access data
B) It's a measure that ensures data is not tampered during the transmission
C) It's a measure that ensures programs that generate data does not have any errors so
that attacks can access the data
D) All of the above - Answer-C) It's a measure that ensures programs that generate
data does not have any errors so that attacks can access the data

What dependability functions are implemented in WCF? - Answer-security and reliability

Where are the credentials saved in the built-in account management (offered by the
pages in the "Account" folder) of ASP .Net application? - Answer-in a database

,how is the Windows-based security implemented in a Web application? - Answer-all
access to a web application or web service must go through IIS, which assigns every
request an access token. the access token enables the Windows OS to perform ACL
(access control list) checks on resources targeted by the request.

How does the Windows security mechanism work in Web application security control? -
Answer-It compares the received credential with the credential saved in Windows's user
accounts.

In Windows-based security system, the access control list is stored in... - Answer-the
Windows operating system.

Windows security can be used to control user access to a Website. This security
mechanism can be best applied to the users of - Answer-corporate intranet applications

how is the form-based security implemented in a Web application? - Answer-it used the
Web.config file to define the detailed security policies. the system.web section can be
used to define authentication and authorization to a web application.

What is (are) the problem(s) associated with the standard Windows Forms Security
mechanism? - Answer-- passwords are stored in clear text
- sequential comparisons of user name and password
- unmanageable if accessibility needs to be changed frequently

Where can the credential be possibly saved if the Forms security is used? - Answer-- In
Web.Config file.
- In a user-defined XML file.
- In a user-defined database.

In Forms security, if login is successful, what are the possible solutions to store the
user-entered credential? Select all that apply. - Answer-- As a cookie on client side.
- In a hidden area in the client's web browser.

By default, the cookies used in the Forms-based Security are protected by... - Answer--
using encryption to prevent reading.
- using digital signature to prevent modification.

What are the main roles of IIS in Web application security control? - Answer-- It creates
an access token and passes it to ASP .Net or to Windows for security check
- It blocks IP address and domain that are not permitted

What security mechanism(s) does IIS support? - Answer-- access control list
- IP address restrictions
- domain name restrictions
- encrypted HTTP connections

, Web.config file in ASP.Net application is used for... - Answer-authentication and
authorization

How is the authorization applied to a resource (a page) in ASP .Net application? -
Answer-Authorization information is stored in the Web.config file in the sub directory in
which the page resides.

What are the main problems of storing the credentials in Web.config file? - Answer-
Unmanageable if the number of users is large.
Sequential comparisons of passwords.

What do you do if you want to use your own file for storing the credentials, instead of
using Web.conf? - Answer-Write your own code to handle the access control.

The <authorization> element in a Web.cong file consists of a list of <allow> and <deny>
elements.... - Answer-The elements must be specifically ordered according to
authorization requirement.

Which of the following sequences does not make sense logically or semantically? -
Answer-<deny users="*"/> <allow users="bob"/>

What is the strongest security option in the Forms-based Web security (the most secure
mode)? - Answer-The clause <identity impersonate ="..." /> does not appear in
Web.config file.

In what configuration setting will ASP .Net use the security token passed to it by IIS? -
Answer-<identity impersonate = "false">

Why do you need to create your own machine key in if your ASP .Net application is
hosted in a server farm environment? - Answer-A server farm does not have a unique
machine key

Where do you use the secure machine key generated for your ASP .Net application? -
Answer-In the Web.config file, in the element system.web

What features does Windows Communication Foundation support? - Answer-- Platform-
independent communication.
- WS-Security and WS-ReliableMessaging.

What is (are) the major dependability feature(s) added into the Windows
Communications Foundations? - Answer-- WS-Security
- Reliable Sessions (WS-R)
- Interoperability (WS-I)

what is WS-Specification?
€11,59
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Scholarsstudyguide nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
792
Lid sinds
3 jaar
Aantal volgers
475
Documenten
15431
Laatst verkocht
1 dag geleden
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3,9

164 beoordelingen

5
87
4
21
3
26
2
6
1
24

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen