Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Secure Programming Practices Interview Questions and Answers
Home
Questions
Secure Programming Practices
0
votes
Identify the correct statement in the following on secure-programming
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Identify the correct statement in the following:
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
It is a good programming practice to prevent caching of sensitive data at client or proxies, by implementing which of the following?
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-practice
0
votes
What is the purpose of Audit Trail and Logging?
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
audit-trail
audit-logging
0
votes
Which of the followings are secure programming guidelines?
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-guidelines
0
votes
Which of the following is not an authentication method?
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication-method
0
votes
If an attacker submits multiple input parameters (query string, post data, cookies, etc) of the same name, the application may react in unexpected ways and open up new avenues of server-side
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
session-hijack
session-attack
0
votes
Authentication and session management are security concerns of which of the following programming languages?
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication
session-management
0
votes
Identify the correct statement in the following:
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
What forces the user to change password at first login?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which happens first authorization or authentication?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Grant limited permission to specified account A. File Shredding B. File sharing and permission C. File corrupting D. File integrity
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What does Light Directory Access Protocol (LDAP) doesn’t store?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is a strong password?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What is not a good practice for user administration?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
_ is a type of software designed to help the user’s computer detect viruses and avoid them.
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is a good practice?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is least secure method of authentication ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Why is one time password safe ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What is characteristic of RADIUS system?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is considered as the unsolicited commercial email?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which one of the following can be considered as the class of computer threats?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
In which of the following, a person is constantly followed/chased by another person or group of several peoples?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What is characteristics of Authorization ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
From the following, which is not a common file permission?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following are forms of malicious attack?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What are the common security threats?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
How can a confidential message be securely distributed?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
Page:
1
2
next »
...