Login
Remember
Register
Ask a Question
Recent questions in Data Handling
0
votes
1
answer
What are ‘Models’?
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
What are the various files that are created when you create a Django Project? Explain briefly.
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
How do you connect your Django project to the database?
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
Give a brief about ‘django-admin’.
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
Explain Django architecture.
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
What are the advantages of using Django?
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
How do you check for the version of Django installed on your system?
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
What are the features of Django?
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
Name some companies that make use of Django?
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
What is Django?
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
1
answer
Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
0
answers
To build SQL statements it is more secure to user PreparedStatement than Statement.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#sql-build
DataHandling-questions-answers
0
votes
1
answer
A function in which scripting tags in all dynamic content can be replaced with codes in a chosen character set.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#dynamic-coding
secure-code-review
DataHandling-questions-answers
0
votes
1
answer
The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#encoding
secure-code-review
DataHandling-questions-answers
0
votes
0
answers
The first step in analyzing the attack surface is ________.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-analysis
DataHandling-questions-answers
0
votes
1
answer
Defect density alone can be used to judge the security of code accurately.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#defect-density
secure-code-review
DataHandling-questions-answers
0
votes
0
answers
Which of the following can be used to prevent end users from entering malicious scripts?
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#data-validation
DataHandling-questions-answers
0
votes
0
answers
The process by which different equivalent forms of a name can be resolved to a single standard name,
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-canonicalization
DataHandling-questions-answers
0
votes
0
answers
Authorization that restricts the functionality of a subset of users.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-authorization
DataHandling-questions-answers
0
votes
0
answers
The process through which the identity of an entity is established to be genuine.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-identity
DataHandling-questions-answers
0
votes
0
answers
Which of the following are threats of cross site scripting on the authentication page?
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-authentication-page
DataHandling-questions-answers
0
votes
0
answers
The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-characteristics-range
DataHandling-questions-answers
0
votes
0
answers
In a multi user multi-threaded environment, thread safety is important as one may erroneously gain access to another individuals session by exploiting ___________ .
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-thread-safety
DataHandling-questions-answers
0
votes
0
answers
Inviting a friend to help look for a hard-to-find vulnerability is a method of security code review.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-vulnearability
DataHandling-questions-answers
0
votes
0
answers
Complexity increases with the decision count.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-complexity
DataHandling-questions-answers
0
votes
0
answers
The estimation of software size by measuring functionality.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-size-estimation
DataHandling-questions-answers
0
votes
0
answers
Numerical values that describe a trait of the code such as the Lines of Code come under ________.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#line-of-code
DataHandling-questions-answers
0
votes
0
answers
It is easy to distinguish good code from insecure code.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#insecured-code
DataHandling-questions-answers
0
votes
0
answers
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#source-code-review
DataHandling-questions-answers
0
votes
0
answers
The information gathered should be organized into a _________ that can be used to prioritize the review.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#information-model
DataHandling-questions-answers
Page:
« prev
1
2
3
4
5
6
7
next »
Recent questions in Data Handling
...