in General by

Authorization that restricts the functionality of a subset of users.

(1)Vertical Authorization

(2)Horizontal Authorization

1 Answer

0 votes
by
Correct answer:-(1)Vertical Authorization

Related questions

0 votes
    Facebook Adverts is an advertising platform that can deliver ads on _____________. (1)Instagram (2)Both Facebook and Instagram (3)Facebook...
asked May 17, 2021 in General by JackTerrance
0 votes
    Which of the following options are principal classes of DoS attacks? (1)Complex Queries (2)Application usage (3)Abuse of functions (4)Bugs in database (5)All the applications...
asked May 17, 2021 in General by JackTerrance
0 votes
    Parameterized stored procedures are compiled after the user input is added. (1)True (2)False...
asked May 17, 2021 in General by JackTerrance
0 votes
    Which of the following is an efficient way to securely store passwords? (1)Abstraction (2)Hashing (3)Encryption...
asked May 17, 2021 in General by JackTerrance
0 votes
    It is easy to develop secure sessions with sufficient entropy. (1)False (2)True...
asked May 15, 2021 in General by JackTerrance
0 votes
    ________ can be used to establish risk and stability estimations on an item of code, such as a class or method ... code (2)Defect density (3)Risk density (4)Cyclomatic complextiy...
asked May 15, 2021 in General by JackTerrance
0 votes
    Complexity increases with the decision count. (1)False (2)True...
asked May 15, 2021 in General by JackTerrance
0 votes
    Inviting a friend to help look for a hard to find vulnerability is a method of security code review. (1)True (2)False...
asked May 15, 2021 in General by JackTerrance
0 votes
    To build SQL statements it is more secure to user PreparedStatement than Statement. (1)True (2)False...
asked May 15, 2021 in Education by JackTerrance
0 votes
    Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is ... Open-Design Fail-safe Defaults None of the above...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Accessing computer without prior authorization is a cyber-crimes that come under _______ (a) Section 65 (b) Section 66 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    I am learning about OAuth2 and OpenID Connect by experimenting with ASP.NET Core and IdentityServer4. So far ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked May 21, 2022 in Education by JackTerrance
0 votes
    I'm getting Authorization failure when trying to display a map in a flutter project using the google maps ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked May 7, 2022 in Education by JackTerrance
0 votes
    In our organization we are developing an ldap based Authentication, and Authorization with Single Sign On on ... for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Feb 27, 2022 in Education by JackTerrance
0 votes
    ____________ is a scenario when information is accessed without authorization. (a) Data infiltration (b) Data Hack (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...