Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
Developers A and B are building the same feature on feature/X branch.
asked
Feb 13, 2022
in
Git
by
rajeshsharma
git-push
0
votes
1
answer
What is the command to delete a branch in your remote repository?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
git-delete
0
votes
1
answer
What does the command git checkout -b branchname do?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
git-checkout
0
votes
1
answer
When you run git fetch from my local repo, will it update your local code and target branch?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
git-fetch
target-branch
0
votes
1
answer
When you run git fetch from your local repo, it will update your local changes in working area?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
local-repo
git-fetch
0
votes
1
answer
Which type of remote URL does not require your user-name and password while for cloning or pushing?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
remote-url
clone-password
0
votes
1
answer
Which command shows the difference between the working directory and the index or staging area?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
index-directory
staging-area
0
votes
1
answer
Which command can you use to update remote refs with local refs?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
remote-refs
local
refs
0
votes
1
answer
How to display only the names of the changed files?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
git-change-files
0
votes
1
answer
What is an example of a session-related vulnerability?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which threat can be prevented by having unique usernames generated with a high degree of entropy?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
For a connection that changes from HTTP to HTTPS, what flaw arises if you do not change the session identifier?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What threat arises from not flagging HTTP cookies with tokens, as secure?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What attack can be prevented by links or forms that invoke state-changing functions with an unpredictable token for each user?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following actions should you take to verify the implementation of a web application?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following are the best ways to implement transport layer protection?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
In which of the following scenarios should you use the escaping technique?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What happens when an application takes user inputted data, and sends it to a web browser without proper validation and escaping?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following depict the typical impact of failure to restrict URL access?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What is the attack technique used to exploit websites by altering the backend database queries through inputting manipulated queries?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What flaw arises from session tokens having poor randomness across a range of values?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following consequences are most likely to occur due to an injection attack?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following are the best ways to protect against injection attacks?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What type of flaw occurs when untrusted user-entered data is sent to the interpreter as part of a query or command?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Is it possible to export all batches immediately after recognition, without any verification by operators?
asked
Feb 12, 2022
in
ABBYY FlexiCapture
by
AdilsonLima
abbyy-flexicapture-interview-question-answer
0
votes
1
answer
While editing automation, you can open the playback file.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
playback-file
pega
0
votes
1
answer
Data can be modified in all child cases.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
child-cases
data
pega
0
votes
1
answer
_________ is used for specifying unique data elements.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
data-element
0
votes
1
answer
__________ components help in connecting one part of automation to another.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
automation
pega
0
votes
1
answer
To create a window based application, which adapter should be chosen?
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
adapter
pega
window-application
Page:
« prev
1
...
568
569
570
571
572
573
574
575
576
577
578
...
667
...
next »
Recent questions
...