Page 254 - DCAP312_WEB_TECHNOLOGIES_II
P. 254
Web Technologies-II
Notes 7. Name and path are set to the values defined in the application’s Authorization
Configuration file.
( a) Name (b) Path
( c) Name and path (d) None of these.
8. IIS can also grant or deny access based on a user’s ………………….
( a) . host name or ip address (b) host name
( c) . ip address (d) None of these.
9. Timeout is used to specify a limited lifetime for the forms authentication session. The
default value is …………..
( a) 60 minutes (b) 90 minutes
( c) 30 minutes (d) None of these.
10. It is designed to provide strong authentication for client/server applications by
using……………...
( a) secret-key cryptography. (b) secret-key encryptography.
( c) cryptography. (d) encryptography.
True or False
11. IIS deciphers and optionally authenticates the request. It Allow Anonymous is set to False,
no authentication occurs.
( a) True (b) False
12. The processes communicate through events.
( a) True (b) False
13. Cookies are small text files that the server and browser exchange on each page request.
( a) True (b) False
14. Cookies never changed in Webpages.
( a) True (b) False
15. Passport authentication is a centralized authentication service, which Microsoft provides,
that offers a single log on and core profile services for member sites.
( a) True (b) False
12.3 Summary
• The user store contains user credentials such as user names and passwords, and in some
cases, personalization information.
• Authentication is the process of obtaining identification credentials such as name and
password from a user and validating those credentials against some authority.
• A system by which unauthenticated requests are redirected to an HTML form using HTTP
client-side redirection. The user provides credentials and submits the form.
• Forms authentication provides us with a way to handle authentication using our own
custom logic with in an ASP.NET application.
248 LOVELY PROFESSIONAL UNIVERSITY