computer system security quiz 8 solution

                        computer system security quiz 8 solution


Important Notes:- 

Hello Dosto Please Subscribe Our Youtube channel  Because Copyright Problem In this post ( python / css / Al / nptel ) So please i humble Request Subscribe Our channel or social Networks ( than we are all are connect To each and every person ) These are Our youtube channel My Youtube Channel .. only 321 subscribe in my youtube  channel .(  channel ko subscribe kar lo kyuki kabhi bhi website band ho sakti hai sar post 2019 se ho rhe hai or answer sare senior ke dwara batye hue hai ) . youtube channel ko jaldi se share karo tak jada subscribe ho jaye to copyright ka koi problem na ho .. thanks 



 Q:1. Password should be combination of ____. (according to the video lecture).

1.Lower case letters only

2.Memorable names and dates

3.Upper case and lower-case letters, numbers and non letter characters

4.Upper case and lower-case letters, numbers and symbols


Answer:- 4.Upper case and lower-case letters, numbers and symbols




Reason:- The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words


Q:2. The cookies we use, are sent with ______, which in general, _____ the performance.

1.only when requested,improves

2.every request, degrades

3.extra information, is useless for

4.None of the mentioned


Answer:- 2.every request, degrades


Reason :- typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus performance begins to degrade.


Q:3. Which of the following header is used to create cookie ?

1.Create-Cookie

2.Init-Cookie

3.Set-Cookie

4.Start-Cookie


Answer:- 3.Set-Cookie


Reason:- After receiving an HTTP request, a server can send one or more Set-Cookie headers with the response. The cookie is usually stored by the browser, and then the cookie is sent with requests made to the same server inside a Cookie HTTP header.


Q:4. _______ is an attack to inject code, in which malicious SQL code is passed to an instance of SQL Server from ______.

1.SQL injection, user input field

2.code injection, another server

3.both 1 and 2

4.None of the above.


Answer:-1.SQL injection, user input field.


Reason:- SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).


Q:5. How to prevent SQL injection ?


1.Use parameterized / prepared SQL

2.use string concatenated query

3.Both A and B

4.None of the above


Answer:- 3.Both A and B.


Reason:- The best way to prevent SQL Injections is to use safe programming functions that make SQL Injections impossible: parameterized queries (prepared statements) and stored procedures. Every major programming language currently has such safe functions and every developer should only use such safe functions to work with the database.


Post a Comment

6 Comments