Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following is not an authorization type?
Home
Secure Programming Practices
Which of the following is not an authorization type?
0
votes
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
Which of the following is not an authorization type?
a) Role-based Access Control
b) Mandatory Access Control
c) User Access Control
d) Discretionary Access Control
authorization-type
user-access
secure-programming-practices
Please
log in
or
register
to answer this question.
0
Answers
Related questions
0
votes
Q: Which of the following is not recommended to secure web applications against authenticated users?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-programming-practices
web-applications
0
votes
Q: Which of the following is the best approach to use when providing access to an SSO application in a portal?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
sso-application
application-access
secure-programming-practices
0
votes
Q: Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
string-attack
web-application-attack
secure-programming-practices
0
votes
Q: Which of the following algorithm/encryption method is the safest to use?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
algorithm-secure
encryption
secure-programming-practices
0
votes
Q: To improve the overall quality of web applications, developers should abide by which of the following rules?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
web-application
web-security
secure-programming-practices
0
votes
Q: Which of the following is true about improper error handling?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
improper-error-handling
eror-handling
secure-programming-practices
0
votes
Q: Which of the following is a best practice for Audit Trail and Logging?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
audit-trail
audit-logging
audit
secure-programming-practices
0
votes
Q: Which of the following is a security advantage of managed code over unmanaged code?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-advantages
managed-code
secure-programming-practices
0
votes
Q: Secure practices for access control include which of the following?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-practices
access-control
secure-programming-practices
0
votes
Q: Setting the cookie flag to which of the following mode is a good programming practice?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
cookie-flag
secure-programming-practices
good-programming-practice
...