Login
Remember
Register
User rajeshsharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by rajeshsharma
0
votes
0
answers
Cryptographic Hash Function transforms an arbitrary length of a fixed length string that act more or less as a Fingerprint of the document
asked
Sep 6, 2021
in
Cryptography
hash-function
0
votes
0
answers
Which of these US states introduced the BitLicense regulation for cryptocurrency companies?
asked
Sep 6, 2021
in
Bitcoin
cryptocurrency
0
votes
0
answers
Which site run by Ross Ulbricht was closed by the FBI for letting people buy drugs with Bitcoin?
asked
Sep 6, 2021
in
Bitcoin
bitcoin-drug
0
votes
0
answers
Which of the following is popularly used for storing bitcoins?
asked
Sep 6, 2021
in
Bitcoin
bitcoin-store
0
votes
1
answer
Is it okay to share a session ID via a URL?
asked
Aug 21, 2021
in
Authentication
session-id
url-session
0
votes
1
answer
Which of the following method is the best one to save a password?
asked
Aug 21, 2021
in
Authentication
save-password
password-authentication
0
votes
1
answer
A JWT contains which of the following?
asked
Aug 21, 2021
in
Authentication
jwt
jwt-header
0
votes
1
answer
Which of the following are protocols used for SSO?
asked
Aug 21, 2021
in
Authentication
sso
sso-protocols
0
votes
1
answer
In the stateless JWT authentication method, user sessions are not stored at server side.
asked
Aug 21, 2021
in
Authentication
jwt-authentication
authentication-method
0
votes
1
answer
What is federated SSO?
asked
Aug 21, 2021
in
Authentication
sso
sso-federated
0
votes
1
answer
What is "SiteMinder Web Access Management"?
asked
Aug 21, 2021
in
Authentication
siteminder
web-access
0
votes
1
answer
____________ refers to the validity of a claimed identity.
asked
Aug 21, 2021
in
Authentication
identity-validity
0
votes
1
answer
In a typical "Web SSO" scenario, a secure, transient HTTP cookie can be used to exchange an SSO token between an "identity provider" and a "service provider".
asked
Aug 21, 2021
in
Authentication
web-sso
http-cookie
identity-provider
0
votes
1
answer
The processes of identification and authentication are the same.
asked
Aug 21, 2021
in
Authentication
authentication-process
0
votes
1
answer
JWT tokens are prone to XSS attacks.
asked
Aug 21, 2021
in
Authentication
jwt-tokens
xss-attacks
0
votes
1
answer
A JWT can be stored at which of the following locations?
asked
Aug 21, 2021
in
Authentication
jwt-location
jwt
0
votes
1
answer
The SameSite cookie attribute enables to prevent?
asked
Aug 21, 2021
in
Authentication
samesite-cookie
cookie
authentication-samesite
0
votes
1
answer
What is "OAuth"?
asked
Aug 21, 2021
in
Authentication
oauth
application-authorization
0
votes
1
answer
Authorization can be done only after completing the identification and authentication process.
asked
Aug 21, 2021
in
Authentication
authorization
authentication-process
application-authentication
0
votes
1
answer
What is SAML?
asked
Aug 21, 2021
in
Authentication
saml
0
votes
1
answer
Is an application required to generate a new session after authentication?
asked
Aug 21, 2021
in
Authentication
application-authentication
0
votes
1
answer
What is principal authentication?
asked
Aug 21, 2021
in
Authentication
authentication-principal
0
votes
1
answer
Home Realm Discovery behavior provided by Azure Active Directory enables credentials to be stored in a corporate AD.
asked
Aug 21, 2021
in
Authentication
azure-active-directory
home-realm-discovery
0
votes
1
answer
Which of the following types of attack is prevented by multi-factor authentication?
asked
Aug 21, 2021
in
Authentication
attack-types
attacks
0
votes
1
answer
An API proxy can be deployed in ____ environment(s).
asked
Aug 15, 2021
in
APIGEE - API Services
api-proxy
0
votes
1
answer
Consumer key and consumer secret are created for _____
asked
Aug 15, 2021
in
APIGEE - API Services
consumer-key
consumer-secret
0
votes
1
answer
________ uses Google Maps APIs to create a mashup of real estate information with interactive maps.
asked
Aug 15, 2021
in
APIGEE - API Services
google-map-api
0
votes
1
answer
An API product consists of a collection of RESTful API resources.
asked
Aug 15, 2021
in
APIGEE - API Services
restful-api
0
votes
1
answer
Authorization header can be sent to the backend service.
asked
Aug 15, 2021
in
APIGEE - API Services
authorization-header
0
votes
1
answer
VerifyAccessToken operation at the end of API proxy flow.
asked
Aug 15, 2021
in
APIGEE - API Services
verifyaccesstoken
Page:
« prev
1
...
85
86
87
88
89
90
91
92
93
94
95
...
187
next »
...