Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Identify Correct statement:
Home
Threat Modeling
Identify Correct statement:
0
votes
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
Identify Correct statement:
a) Using prepared statements can prevent SQL injection attack
b) Do not use banned or deprecated version of APIs
c) Both
d) None of the above
threat-modeling
ssa
sql-injection-attack
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 18, 2021
by
sharadyadav1986
Correct Answer is
c) Both as both are required
Using prepared statements can prevent SQL injection attack
Do not use banned or deprecated version of APIs
Related questions
0
votes
Q: Select the Correct statement.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
authorization
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
Q: State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
secure-software
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: Why is it not a good idea to include readymade code from Google search into the customer application deliverables even though it may save a lot of time and cost for the project?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
google-search
threat-modeling
ssa
0
votes
Q: The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#validations
threat-modeling
ssa
ascii-range
0
votes
Q: Process Flow Diagrams are used by ___________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
process-flow-diagrams
pfd
threat-modeling
ssa
0
votes
Q: The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
Q: Identity theft is an example of __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-example
threat-modeling
ssa
0
votes
Q: An action that harms an asset is ________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
asset-harm
harm-action
action-harm
ssa
threat-modeling
...