Which threat can be prevented by having unique usernames generated - ProProfs Discuss
Topics-
Products +
     

Which threat can be prevented by having unique usernames generated with a high degree of entropy?



A. Crypt-analysis of hash values
B. Spamming
C. Authorization Bypass
D. Authentication bypass

This question is part of OWASP TOP 10
Asked by Coulter, Last updated: May 13, 2019

+ AnswerRequest Answer
...

3 Answers

L. Brett

Ask me anything!

L. BrettSales Manager, MBA, Detroit
Sales Manager, MBA, Detroit

Answered on Jun 07, 2019

The correct answer to this question is D, Authentication bypass. This bypass can prevent hackers from installing malware on the device or taking data. Having a unique username can make it harder on the hacker to log into the device.

There are many other ways to prevent authentication bypass. Like having a unique username, having a unique password is just as important. If a hacker is able to get the username, the unique password can prevent them from getting any further than the log in screen. Another way to prevent this is having files locked and secured, requiring a unique password to access them.

 Reply

L. Thornton

Curious about the World

L. ThorntonStudent, MBA, Los Angles
Student, MBA, Los Angles

Answered on Apr 24, 2019

The answer to this is letter D. Authentication Bypass may sometimes occur when there are usernames that are almost similar to each other. There are some people who try their best to copy certain usernames and they will do it in such a way that the system may not always recognize the difference. Systems are more high tech now so it will be harder to do this.

Some are able to skip the login page and just enter pages that they are not authorized to view. This can be a problem for people who are trying to keep some information confidential. When this occurs, the person will automatically reach a page that should only be accessed after the person has logged in successfully.

 Reply

John Smith

John Smith

Answered on Nov 01, 2016

Authentication bypass
 Reply

Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer

Email Sent
We have sent an email to your address "" with instructions to reset your password.