We are providing online training of realtime Live project on Asp.Net MVC with Angular and Web API. For more information click here. If you have any query then drop the messase in CONTACT FORM

Tuesday, June 30, 2015

ASP.NET Interview Questions on Data Access Security

What are the best practices to follow to secure connection strings in an ASP.NET web application?


  • Always store connection strings in the site's Web.config file. Web.config is very secure. Users will not be able to access web.config from the browser.
  • Do not store connection strings as plain text. To help keep the connection to your database server secure, it is recommended that you encrypt connection string information in the configuration file.
  • Never store connection strings in an aspx page.
  • Never set connection strings as declarative properties of the SqlDataSource control or other data source controls.
Why is "Connecting to SQL Server using Integrated Security" considered a best practice?
Connecting to SQL Server using integrated security instead of using an explicit user name and password, helps avoid the possibility of the connection string being compromised and your user ID and password being exposed.

What is the advantage of storing an XML file in the applications App_Data folder? 
The contents of the App_Data folder will not be returned in response to direct HTTP requests.


What is Script injection? 
A script injection attack attempts to send an executable script to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database so that another user who views the data inadvertently runs the code.


What is SQL injection?

A SQL injection attack attempts to compromise your database by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application.

What are the best practices to keep in mind when accepting user input on a web application?

  • Always use validation controls whenever possible to limit user input to acceptable values.
  •  Always check the IsValid property of the aspx page. Run the server-side code only if the IsValid property value is true. A value of false means that one or more validation controls have failed a validation check.
  • Always perform server-side validation irrespective of client-side validation being performed or not. This will protect your web application even if the client has by passed the client-side validation by disabling javascript in the web browser.
  • Also, make sure to re validate user input in the business logic layer of your application.

What are the steps to follow to avoid Script Injection attacks?
1.
 Encode user input with the HtmlEncode method. This method turns HTML into its text representation.
2. If you are using the GridView control with bound fields, set the BoundField object's HtmlEncode property to true. This causes the GridView control to encode user input when the row is in edit mode.


What are the steps to follow to avoid SQL Injection attacks?
Always use parameterized queries or stored procedures instead of creating SQL commands by concatenating strings together.

Can you encrypt view state data of an aspx page? 
Yes, you encrypt view state data of an aspx page by setting the page's ViewStateEncryptionMode property to true.

No comments: