Securing Applications Against Access from Other Applications Flashcards

1
Q
Which of the following are settings configured in the Application Settings? More than one response may be correct.
A. Accessible from
B. Allow configuration
C. Can update
D. Runtime Access Tracking
E. Restrict Table Choices
A

D. Runtime Access Tracking

E. Restrict Table Choices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which Runtime Access Tracking option prevents a script from accessing resources until explicitly allowed?
A. None
B. Blocking
C. Enforcing
D. Tracking
E. Validating
A

C. Enforcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False? The NeedIt table is the only table available because the Restrict Table Choices option is selected in the Application Settings.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is NOT a database setting on the Application Access section of a Table?
A. Can create
B. Can read
C. Can write
D. Can update
E. Can delete
A

C. Can write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the cause for the errors from the log?
Two log entries: One states Failed API level ACL Validation and the other states WebServicePolicyValidator: Table access denied by WebService Access Policy.
A. Accessible from is configured to This application scope only
B. Allow access to this table via web services is deselected
C. Allow Configuration is deselected
D. Can update is deselected
E. Can read is deselected

A

B. Allow access to this table via web services is deselected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes the purpose of the Allow configuration option on the Application Access section of a Table record?
A. Allows out-of-scope applications to create application files for a table
B. Allows out-of-scope applications to create records for a table
C. Allows out-of-scope applications to adjust form and list layouts for a table
D. Allows out-of-scope applications to extend a table
E. Allows out-of-scope applications to configure access control for a table

A

A. Allows out-of-scope applications to create application files for a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly