in Education by
A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication. (a) OpenID (b) Sign-on system (c) Security Assertion Markup Language (SAML) (d) Virtual Private Database (VPD) The question was asked by my school teacher while I was bunking the class. The origin of the question is Application Security in chapter Database Programming Techniques of Database Management

1 Answer

0 votes
by
Right choice is (b) Sign-on system Easiest explanation - Once the user logged in at one site, he does not have to enter his user name and password at other sites that use the same single sign-on service.

Related questions

0 votes
    An _______________ allows users for accessing the web while blocking the trackers or agents that keep tracing the identity ... 2) extranet 3) complex network 4) anonymity network...
asked Dec 29, 2020 in Technology by JackTerrance
0 votes
    The term _____________ means taking care of a user's name as well as the identity hidden or veiled using a ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    The term _____________ means taking care of a user’s name as well as the identity hidden or veiled using a ... . a) pseudonymous b) anonymous c) eponymous d) homonymous...
asked Dec 29, 2020 in Technology by JackTerrance
0 votes
    _________ is an attack which forces an end user to execute unwanted actions on a web application in which ... , Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    ______________ policy allows multiple updates to accumulate on a block before it is output to stable storage, ... Management topic in chapter Recovery System of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    If you had enabled a Conditional Access Policy for External Users using multi-factor authentication, and then also ... users, would they trigger both when accessing content?...
asked Mar 10, 2021 in Technology by JackTerrance
0 votes
    who allows two or more users to work on single computer at same or different time Select the correct answer from above options...
asked Dec 31, 2021 in Education by JackTerrance
0 votes
    A Web site that allows users to enter text, such as a comment or a name, and then stores ... Application Security in chapter Database Programming Techniques of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    Would you recommend that users go through the guest user request process to allow them to share a file from SharePoint with an external person?...
asked Mar 10, 2021 in Technology by JackTerrance
0 votes
    The process through which the identity of an entity is established to be genuine. (1)Identity Management (2)Access controls (3)Authorization (4)Authentication...
asked May 13, 2021 in Technology by JackTerrance
0 votes
    __________ contains a huge proxy DB which users can use to protect their online privacy and preserve their ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    _______________ has made PL/SQL code run faster without requiring any additional work on the part of the ... topic in chapter Query Processing Techniques of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    Even with two-factor authentication, users may still be vulnerable to_____________attacks. (a) Radiant (b) ... in portion Database Programming Techniques of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
0 votes
    A _____is divided into multiple layers and each layer is further divided into several blocks called nodes. a) ... ) Hidden Layers Select the correct answer from above options...
asked Nov 13, 2021 in Education by JackTerrance
...