Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
The use of proper security techniques can :
Home
Secure Programming Practices
The use of proper security techniques can :
0
votes
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
The use of proper security techniques can :
1. Minimize the threat of attackers
2. allow access to unathorized users
3. Provide fame and reputation
4. create secret pages for access
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 17, 2021
by
DavidAnderson
Minimize the threat of attackers
Related questions
0
votes
Q: Which of the following is a security advantage of managed code cover over unmanaged code?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
manage-code
0
votes
Q: Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: How can a confidential message be securely distributed?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
secure-programming
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
Q: Security code review should be done throughout the SDLC.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#security-code
sdlc-security-code-review
ssa
0
votes
Q: Error Handlinug reveal stack traces or other overlay informative error message to users. this will be categorized under security Misconfiguration?
asked
Mar 17, 2021
by
DavidAnderson
ssa
0
votes
Q: What are the basic security requirement of a typical SSO solution?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
...