In a scenario where a web application has no timeout policy, a user's session is allowed to remain active for several hours without any activity. This approach is acceptable for maintaining security in the application.
This statement is false because failing to implement a timeout policy for user sessions significantly increases the risk of unauthorized access. If a session remains active for extended periods without user interaction, it exposes the application to threats such as session hijacking. Best practices for session management include enforcing inactivity timeouts and regularly reviewing session activity to mitigate such risks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a timeout policy, and why is it important for web applications?
Open an interactive chat with Bash
What is session hijacking, and how can it affect users?
Open an interactive chat with Bash
What are best practices for session management in web applications?
Open an interactive chat with Bash
ISC2 CISSP
Identity and Access Management (IAM)
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access