Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
CAPTCHA is used as remediation for which of the following attacks?
Home
Threat Modeling
CAPTCHA is used as remediation for which of the following attacks?
0
votes
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
CAPTCHA is used as remediation for which of the following attacks?
a) CSS
b) Cross Site Request Forgery
c) Brute Force Attack
d) Direct Object reference.
captcha-authentication
remediation
security-attacks
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 18, 2021
by
sharadyadav1986
c) Brute Force Attack
CAPTCHA is used as remediation of Brute Force Attack
Related questions
+1
vote
Q: How Does Saml Protect Against "guy-in-the-middle" And "replay" Security Attacks In General?
asked
Mar 19, 2021
in
SAML
by
SakshiSharma
saml
guy-in-the-middle
security-attacks
0
votes
Q: Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
data-files
0
votes
Q: From application security perspective, why should a CAPTCHA be used in a web application?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
application-security
captcha-security
secure-programming-practices
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: Which of the following can be used to protect against DDoS attacks? Choose 2 answers from the options given below.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
shield
ddos
attacks
0
votes
Q: Which of the following is used to retain integrity in a software?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
software-integrity
software-security
ssa
0
votes
Q: The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
asked
May 20, 2023
in
CISA
by
Robindeniel
organizationnetwork
0
votes
Q: Which of the following are the types of vulnerabilities that hackers look out for in application to target them for attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Which of the following is correct description for “Accountability” attribute?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
authorization
accountability
security-accountability
0
votes
Q: While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
...