View Count: 0
Duration: 51 mins
Accessed date:
Not Yet Viewed
View Count: 0
Duration: 16 mins
Accessed date:
Not Yet Viewed
Post your comment / feedback here
 
 

Be the first one to comment about this video

Question No: 1 of 16
Authentication is? 
Options:
  1. to verify username or password of a user
  2. to grant or deny permissions
  3. Both
  4. None
View Answer/Explanation:
a
Explanation:
Authentication is an act where one has to prove what they claim themselves to be

Question No: 2 of 16
Authorization is? 
Options:
  1. to verify username or password of a user
  2. to grant or deny permissions based on user identity
  3. both
  4. none
View Answer/Explanation:
b
Explanation:

Question No: 3 of 16
Action methods can be made secured by using which of the following attributes 
Options:
  1. [Authorize]
  2. [Authenticate]
  3. [Secured]
  4. [DenyAnonymous]
View Answer/Explanation:
a
Explanation:

Question No: 4 of 16
The act of determining the identity of the requesting entity is known as __________. 
Options:
  1. Authorization
  2. Authentication
  3. Verification
  4. Validation
View Answer/Explanation:
b
Explanation:
: Authentication is a process of acquiring credential from entity and validating those credentials against some authority.If the credentials submitted by the entity are valid then it is considered as authenticated identity.

Question No: 5 of 16
By default the web browser along with the request does not include any identity of the client. In such cases web server treats such request as __________ request. 
Options:
  1. Unregistered
  2. Visitor
  3. Admin
  4. Anonymous
View Answer/Explanation:
d
Explanation:
Request submitted to the server without clients identities are treated as anonymous requests.

Question No: 6 of 16
If Active Directory Users in a Domain Controller of a network have to be authenticated, then which authentication is best suited 
Options:
  1. Windows Authentication
  2. Forms Authentication
  3. Passport Authentication
  4. Cookies Authentication
View Answer/Explanation:
a
Explanation:
: In Windows Authentication, the identity of user used to login to network will be used for Authentication

Question No: 7 of 16
___________ type of authentication can be used for Intranet Web application. 
Options:
  1. Windows
  2. Forms
  3. Passport
  4. Session
View Answer/Explanation:
a
Explanation:
Windows authentication authenticates network users through the domain controller. Network users have access to Web application resources as determined by their user privileges on the server.

Question No: 8 of 16
The FormsAuthentication class’s ___________ method checks the user name and password against the user list found in the credentials element of Web.config. 
Options:
  1. Authenticate
  2. EnableFormsAuthentication
  3. SetAuthCookie
  4. ReferenceEquals
View Answer/Explanation:
a
Explanation:

Question No: 9 of 16
Which of the following is true 
Options:
  1. Authentication mode can be specified in root directory web.config only.
  2. Authentication mode can be specified in any directory web.config only
  3. Only one type of Authentication is supported by one web application
  4. Every directory can specify its own authentication mode.
View Answer/Explanation:
a c
Explanation:
Only one type of authentication can be supported by one application and all its subdirectories and the mode must be mentioned in root directory web.config only.

Question No: 10 of 16
Whare are the advantages of using Forms authentication? 
Options:
  1. Users have to be member of a domain-based network to have access to the application
  2. Users do not have to be member of a domain-based network to have access to the application.
  3. Forms authentication makes commercial sites easier to create.
  4. authentication allows users to sign in once through a central authority
View Answer/Explanation:
b c
Explanation:
The advantage of using Forms authentication is that users do not have to be member of a domainbased network to have access to your application. Another advantage is that many Web applications, particularly commercial sites where customers order products, want to have access to user information. Forms authentication makes these types of applications easier to create.

  1