Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Secure Programming Practices Interview Questions and Answers
Home
Questions
Secure Programming Practices
0
votes
Q: Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: The use of proper security techniques can :
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
secure-programming
0
votes
Q: Which of the following is a security advantage of managed code cover over unmanaged code?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
manage-code
0
votes
Q: A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-code-review
code-review
0
votes
Q: Secure Programming Practices Interview Questions and Answers
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-programming-practices
secure-programming-techniques
spt-questions
0
votes
Q: Which of the following algorithm/encryption method is the safest to use?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
algorithm-secure
encryption
secure-programming-practices
0
votes
Q: Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-program
secure-programming-practices
0
votes
Q: On logout, how should an application deal with session cookies?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
session-cookies
application-cookies
security-cookies
secure-programming-practices
0
votes
Q: To improve the overall quality of web applications, developers should abide by which of the following rules?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
web-application
web-security
secure-programming-practices
0
votes
Q: From application security perspective, why should a CAPTCHA be used in a web application?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
application-security
captcha-security
secure-programming-practices
0
votes
Q: Which of the following is true about improper error handling?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
improper-error-handling
eror-handling
secure-programming-practices
0
votes
Q: One of the main disadvantages of integrating cryptography into applications is:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
integrity-cryptography
security-application
secure-programming-practices
0
votes
Q: Temporarily files created by applications can expose confidential data if:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
#temporarily-files
secure-programming-practices
confidential-data
security-data
0
votes
Q: Which of the following is a best practice for Audit Trail and Logging?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
audit-trail
audit-logging
audit
secure-programming-practices
0
votes
Q: Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-check
security
secure-programming-practices
0
votes
Q: There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
Q: Which of the following is a security advantage of managed code over unmanaged code?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-advantages
managed-code
secure-programming-practices
0
votes
Q: Which of the following is not an authorization type?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
authorization-type
user-access
secure-programming-practices
+1
vote
Q: Exception Handling refers to:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
exception-handling
exception
error-handling
0
votes
Q: Which of the following is the best approach to use when providing access to an SSO application in a portal?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
sso-application
application-access
secure-programming-practices
0
votes
Q: Which of the following is not recommended to secure web applications against authenticated users?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-programming-practices
web-applications
0
votes
Q: Secure practices for access control include which of the following?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-practices
access-control
secure-programming-practices
0
votes
Q: Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
customer-trust
reputation-security
financial-security
compliance-security
secure-programming-practices
0
votes
Q: Setting the cookie flag to which of the following mode is a good programming practice?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
cookie-flag
secure-programming-practices
good-programming-practice
0
votes
Q: Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
string-attack
web-application-attack
secure-programming-practices
Page:
« prev
1
2
...