In a scenario where a user's access token is compromised, the OAuth implementation should allow ________ to mitigate the risk.
- Token Refresh
- Password Change
- Two-Factor Authentication
- Token Revocation
The correct option is "Token Revocation." If a user's access token is compromised, the OAuth implementation should support revoking or invalidating the token to prevent unauthorized access. This is a crucial security measure to mitigate the risk of unauthorized access.
Loading...
Related Quiz
- Which function in CodeIgniter starts a database transaction?
- In CodeIgniter, where are database connection settings typically defined?
- What is the role of the 'system' directory in the CodeIgniter framework?
- The process of verifying the identity of a user before granting access is known as ________.
- ________ is a common format for transmitting data in social media integrations, particularly for APIs.