Login
Remember
Register
Ask a Question
Recent questions in Secure Programming Practices
0
votes
1
answer
Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
1
answer
In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
1
answer
The use of proper security techniques can :
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
2
answers
Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
secure-programming
0
votes
1
answer
Which of the following is a security advantage of managed code cover over unmanaged code?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
manage-code
0
votes
1
answer
A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-code-review
code-review
0
votes
0
answers
Secure Programming Practices Interview Questions and Answers
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-programming-practices
secure-programming-techniques
spt-questions
0
votes
0
answers
Which of the following algorithm/encryption method is the safest to use?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
algorithm-secure
encryption
secure-programming-practices
0
votes
0
answers
Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-program
secure-programming-practices
0
votes
0
answers
On logout, how should an application deal with session cookies?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
session-cookies
application-cookies
security-cookies
secure-programming-practices
0
votes
1
answer
To improve the overall quality of web applications, developers should abide by which of the following rules?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
web-application
web-security
secure-programming-practices
0
votes
1
answer
From application security perspective, why should a CAPTCHA be used in a web application?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
application-security
captcha-security
secure-programming-practices
0
votes
0
answers
Which of the following is true about improper error handling?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
improper-error-handling
eror-handling
secure-programming-practices
0
votes
0
answers
One of the main disadvantages of integrating cryptography into applications is:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
integrity-cryptography
security-application
secure-programming-practices
0
votes
1
answer
Temporarily files created by applications can expose confidential data if:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
#temporarily-files
secure-programming-practices
confidential-data
security-data
0
votes
0
answers
Which of the following is a best practice for Audit Trail and Logging?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
audit-trail
audit-logging
audit
secure-programming-practices
0
votes
1
answer
Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-check
security
secure-programming-practices
0
votes
1
answer
There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
0
answers
Which of the following is a security advantage of managed code over unmanaged code?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-advantages
managed-code
secure-programming-practices
0
votes
0
answers
Which of the following is not an authorization type?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
authorization-type
user-access
secure-programming-practices
+1
vote
1
answer
Exception Handling refers to:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
exception-handling
exception
error-handling
0
votes
0
answers
Which of the following is the best approach to use when providing access to an SSO application in a portal?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
sso-application
application-access
secure-programming-practices
0
votes
0
answers
Which of the following is not recommended to secure web applications against authenticated users?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-programming-practices
web-applications
0
votes
1
answer
Secure practices for access control include which of the following?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-practices
access-control
secure-programming-practices
0
votes
0
answers
Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
customer-trust
reputation-security
financial-security
compliance-security
secure-programming-practices
0
votes
0
answers
Setting the cookie flag to which of the following mode is a good programming practice?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
cookie-flag
secure-programming-practices
good-programming-practice
0
votes
1
answer
Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
string-attack
web-application-attack
secure-programming-practices
Page:
« prev
1
2
Recent questions in Secure Programming Practices
...