Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions and answers in Secure Code Review
Home
Questions
Secure Code Review
+1
vote
An attempt to make a computer resource unavailable to its intended users is called ______.
answered
Feb 5
in
Secure Code Review
by
AdilsonLima
(
5.6k
points)
ipsecurity-interview-exam-question-answer
+1
vote
What are the attributes of Security Testing?
answered
Feb 5
in
Secure Code Review
by
AdilsonLima
(
5.6k
points)
ipsecurity-interview-exam-question-answer
0
votes
What is the definition of a long tail keyword?
answered
Nov 2, 2022
in
Secure Code Review
by
Robin
(
13.0k
points)
long-tail-keyword
keywords
google
+1
vote
Diffie-hellman algorithm is used for?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following is a digital signature algorithm?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Asymmetric Key Encryption/Decryption requires?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following ensure that information has not been altered in any unauthorized ways by any means?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
#ssa
0
votes
What are the basic security requirement of a typical SSO solution?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
in the context of "authentication ",which of the following is correct description of a user's "identity" or "identifier"?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
+1
vote
Block Cipher is example of
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Symmetric Key Encryption/Decryption requires
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Security Requirement Analysis ensures what from the following?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following are approaches for input validation?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following is the name of the process of comparing cryptographic hash functions of system execution?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Digital signature of a person varies from document to document. state True or false?
answered
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following type of metrics do not involve subjective context but are material facts?
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
secure-code-review
absolute-metrics
0
votes
Which of the following is an efficient way to securely store passwords?
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
#password-security
secure-code-review
0
votes
________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
secure-code-review
cyclometric-complexity
0
votes
A solution to enhance security of passwords stored as hashes.
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
#code-security
secure-code-review
0
votes
Parameterized stored procedures are compiled after the user input is added.
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
#parameterized-store
secure-code-review
0
votes
The average occurrance of programming faults per Lines of Code (LOC) is known as _______.
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
#defect-density
code-review
secue-code-review
0
votes
__________ attempts to quantify the size of the code.
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
#code-size
secure-code-review
code-review
size-code
0
votes
The process that gives a person permission to perform a functionality is known as -----------
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
#code-permission
secure-code-review
0
votes
The account used to make the database connection must have ______ privilege.
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
secure-code-review
database-connection
database-privilege
0
votes
Which of the following is more resistant to SQL injection attacks?
answered
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.1k
points)
#sql-injection-attack
secure-code-review
code-review
0
votes
What are the advantages of the Test Automation Framework?
answered
Dec 24, 2020
in
Secure Code Review
by
SakshiSharma
(
30.8k
points)
#test-automation-framework
test-automation-advantages
0
votes
Expain The Significance of Secure Code
answered
Oct 21, 2020
in
Secure Code Review
by
sharadyadav1986
(
30.4k
points)
#secure-code
0
votes
What is Secure Code Review?
answered
Oct 21, 2020
in
Secure Code Review
by
sharadyadav1986
(
30.4k
points)
#secure-code-review
#code-review
Help get things started by
asking a question
.
...