- ATRUE
- BFALSE
Time Taken:
Correct Answer:
Wrong Answer:
Percentage: %
Correct option:
FALSE
Explanation:
Identification and authentication are two distinct processes:
Identification is the process of claiming an identity (e.g., entering a username or providing an ID). It's essentially saying, "I am [this person]."
Authentication is the process of verifying that the claimed identity is valid (e.g., entering a password or using biometric data). It’s the step where the system checks if the user is indeed who they claim to be.
Thus, while they are related, they are not the same.
Correct option:
TRUE
Explanation:
Authorization is the process of granting or denying access to resources or actions based on the user's identity and permissions. However, authorization can only be performed after identification (the process of identifying the user or system) and authentication (the process of verifying that the identified entity is legitimate). Without these initial steps, the system would not know who the user is or whether they should be granted access to the requested resources.
Correct option:
An open standard that allows users to share personal resources stored on a site with another site, without having to share their credentials.
Explanation:
OAuth (Open Authorization) is an open standard for access delegation. It allows users to grant third-party applications limited access to their resources (like data) on another service without sharing their credentials (such as username and password). For example, a user might allow an application to access their Google contacts, but the application would not have access to their Google password. OAuth allows this secure delegation of access through access tokens, rather than exposing the user's credentials.
Correct option:
A system or entity which can verify and prove identity to other systems/entities involved in the SSO mechanism. Typically, this is also the entity that generates and verifies the SSO token.
Explanation:
In an SSO (Single Sign-On) solution, the identity provider (IdP) is the entity responsible for authenticating the user and verifying their identity. It provides identity information to other systems (called service providers) by generating and verifying the SSO token or authentication assertion, which allows users to access multiple applications without needing to authenticate again.
The IdP does not necessarily encrypt or provide passwords directly to other systems; instead, it manages user credentials and authentication.
Correct option:
All the above options
Explanation:
All of the listed protocols are commonly used for Single Sign-On (SSO):
Thus, all of these protocols can be used for implementing SSO.
Correct option:
Cross-origin information leakage
Explanation:
The SameSite cookie attribute is designed to prevent cross-origin information leakage by controlling how cookies are sent with cross-site requests. This helps protect against cross-site request forgery (CSRF) attacks by ensuring that cookies are only sent in first-party contexts (i.e., when the user is interacting directly with the site that set the cookie).
It does not directly prevent SQL injection, server misconfiguration issues, or XSS attacks.
Correct option:
TRUE
Explanation:
JWT tokens are prone to Cross-Site Scripting (XSS) attacks if they are not handled securely. XSS vulnerabilities occur when an attacker injects malicious scripts into web pages viewed by other users. If a JWT token is stored in a way that is accessible to client-side JavaScript (such as in local storage or a cookie), an attacker could potentially steal the token and use it for malicious purposes.
To mitigate this risk, it's important to:
Correct option:
header, payload, and signature delimited by dots(.)
Explanation:
A JSON Web Token (JWT) consists of three parts:
These three parts are separated by dots (.) in the JWT format, i.e., header.payload.signature.
The other options (footer and signature or footer and header) are incorrect.
Correct option:
B) and C)
Explanation:
Principal authentication involves verifying the identity of an entity (such as a person, device, or group) based on a unique identifier associated with that entity.
Option A) is not specific to principal authentication and seems unrelated to the context of this question. Therefore, B) and C) are the correct options.
Correct option:
Authentication
Explanation:
Authentication refers to the process of verifying the validity of a claimed identity. It ensures that the user or system claiming a specific identity is actually who they say they are, often through methods like passwords, biometrics, or tokens.