Authentication - Interview Questions and Answers for 'Authentication' | Search Interview Question - javasearch.buggybread.com
Javasearch.buggybread.com

Search Interview Questions


 More than 3000 questions in repository.
 There are more than 900 unanswered questions.
Click here and help us by providing the answer.
 Have a video suggestion.
Click Correct / Improve and please let us know.
Label / Company      Label / Company / Text

   



Authentication - Interview Questions and Answers for 'Authentication' - 18 question(s) found - Order By Newest

 Q1. what is the use of cookie and session ? and What is the difference between them ?Java EE
Ans. Cookie and Session are used to store the user information. Cookie stores user information on client side and Session does it on server side. Primarily, Cookies and Session are used for authentication, user preferences, and carrying information across multiple requests. Session is meant for the same purpose as the cookie does. Session does it on server side and Cookie does it on client side. One more thing that quite differentiates between Cookie and Session. Cookie is used only for storing the textual information. Session can be used to store both textual information and objects.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     session   session management   java   cookies   authentication   web application   ebay      intermediate


  Q2. What is the difference between authentication and authorization ?Authentication
Ans. Authentication is the process of verifying the identity and credentials of the user to authenticate him into the system.

whereas

Authorization is the process by which access to a segment , method or resource is determined.

Authorization is usually a step next to authentication.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     authentication  authorization  authentication vs authorization     Asked in 9 Companies      basic        frequent


  Q3. What are the types of authentication used in Web services ?Web Service
Ans. Encrypted User Name / Password
Encrypted Password within Cookie
Encrypted Tokens
IP
Client Certificates
Oauth

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     authentication  security  web service     Asked in 12 Companies      basic        frequent


 Q4. Explain OAuth.Authentication
Ans. OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets without actually sharing the initial, related, single logon credential. Like using Google or Facebook to login to something.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 17 Companies


 Q5. Between Encrypted Password authentication and IP Authentication , which one would you prefer and why ?Authentication
Ans. IP authentication is very restrictive, if IP changes for some reason then getting the new IP white listed on the server firewall could run your day pretty long. I would prefer encrypted password authentication cause it is not affected by IP changes and not limited to a white listed IP, I could use any different machine and get through authentication without any hassle.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     ip authentication   password authentication        frequent


 Q6. What are different ways a user can be authenticated other than username / password ?Authentication
Ans. IP Authentication
IP Range Authentication
Certificates
Authentication Cards

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q7. What are LDAP servers used for ?Java EE
Ans. LDAP servers are typically used in J2EE applications to authenticate and authorise users. LDAP servers are hierarchical and are optimized for read access, so likely to be faster than database in providing read access.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     java   j2ee   ldap   servers   authentication   authorization   architecture   technical lead   technical architect  production support     Asked in 1 Companies


 Q8. What is a certificate authority ?Security
Ans. A trusted organization which issues public key certificates and provides identification to the bearer.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     authentication  auth certificates


 Q9. Explain the use of Client certificates for authentication ?Authentication
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     authentication  client certificates


 Q10. How cookies helps by storing encrypted passwords ?Authentication
Ans. It helps user autofill password on the form where its presented for authentication

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     cookie  authentication


 Q11. Have you ever worked with encrypted Tokens and How ?Authentication
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q12. How did you use authentication in node.js ?Node,js
Ans. Using JWT

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     authentication  node.js     Asked in 2 Companies


 Q13. How to deal with double hop authentication issue?Authentication
 This question was recently asked at 'Bank Of America'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q14. Explain when you would decide to use open authentication ?Authentication
Ans. Google OAuth can be used when we want to grant the access of our google credentials to the service provider ( most likely a cloud-based mobile application) by using the option ' Login via Google'

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     open authentication     Asked in 1 Companies


 Q15. Have you ever worked on any project dealing with authentication and authorization ?Authentication
Ans. Yes, I have worked on single sign on project.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q16. Can we use combination of two authentication mechanism in an application ? Narrate with an example.Authentication
Ans. Yes We can use. Negotiate is a very good example with NTLM fallback mechanism over Kerberose.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q17. What are the different methods for the authentication of Google Compute Engine API ?Google Cloud Platform (GCP)
Ans. MS active directory concept and in GCP its Cloud Identity

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Compute Engine API  GCP Authentication


 Q18. Can you share some of the best practices while designing authentication and authorization system ?Authentication
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     best practices



Help us and Others Improve. Please let us know the questions asked in any of your previous interview.

Any input from you will be highly appreciated and It will unlock the application for 10 more requests.

Company Name:
Questions Asked: