Register Login
Internet / AI Technology University (ITU/AITU)
Created by info@itofthefuture.com
Welcome Anonimous.User to this quiz related to Java Security.

Read the question and choose correct answers. Time is limited to 40 seconds!

Important! Do not forget to rank the quality of the question (from bad to excellent).
An initiator of the quiz will get royalty score for QnAs created by her/him and can win the Top Creativity Prize.
Question:
security/2.gifFigure shows general scheme of form-based authentification technique.
What are possible vulnerabilities of this algorithm?

User name and password are transmitted as HTTP request params and can be
easily extracted



The content of the user dialog box is sent as plain text and can be modified



Login.jsp and error.jsp are accessible from outside the server and can be stolen



The target server is not authenticated and can be substituted



User name is transmitted as HTTP request param and the password can be found
via brute force method



J_security_check servlet is accessible from outside the server and could be
hacked



HTTP connection can break and user name and password will lost



Rank the Quality of the Question from "-10" (bad) or "0" (not clear) to 10 (correct) or even 20 (very good!)
-10 (bad/wrong) 0 (not clear) 10 (correct) 20 (very good!)
Your summary report will be available to you and your instructor. Thank you for your work!!!