
WAPT 2 - JWT
Authored by Nafish Alam
Information Technology (IT)
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which part of a JWT is used to verify the token's integrity?
Header
Payload
Signature
None of the above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of the payload in a JWT?
To encrypt sensitive data
To store claims or data
To verify the integrity of the token
To specify the algorithm used
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm is commonly used for signing JWTs?
MD5
RSA
HMAC-SHA256
AES-128
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does "exp" claim in a JWT represent?
Issuer of the token
Expiry time of the token
Subject of the token
Not Before time
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which header field in JWT specifies the type of token?
typ
alg
kid
iss
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A JWT token is signed using HS256, and you don't have the secret key. What can you do?
Generate a new JWT with a random secret key
Modify the token without verifying the signature
Use a brute force attack to find the secret key
Modify the payload and it will work without the key
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You encounter a JWT where the `alg` field is set to `none`. What does this imply?
The token is invalid
The token is not signed
The token uses a custom algorithm
The token cannot be decoded
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?