Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Error Handlinug reveal stack traces or other overlay informative error message to users. this will be categorized under security Misconfiguration?
Home
Questions
Error Handlinug reveal stack traces or other overlay informative error message to users. this will...
0
votes
asked
Mar 17, 2021
by
DavidAnderson
Error Handlinug reveal stack traces or other overlay informative error message to users. this will be categorized under security Misconfiguration?
1. True
2. false
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 17, 2021
by
DavidAnderson
True
Related questions
0
votes
Q: How can a confidential message be securely distributed?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: in the context of "authentication ",which of the following is correct description of a user's "identity" or "identifier"?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: Which type of users should be allowed to use system accounts?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Security code review should be done throughout the SDLC.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#security-code
sdlc-security-code-review
ssa
0
votes
Q: Both Digital Signature & Message Authentication code (MAC) provides authentication.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
digital-signature
message-authentication-code
mac
ssa
0
votes
Q: Both Digital Signature & Message Authentication Code(MAC) Provides Non Repudiation
asked
Mar 17, 2021
by
DavidAnderson
ssa
0
votes
Q: Which of the following statements is NOT true regarding error handling and Logging?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
error-handling
error-logging
ssa
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
...