Login
Remember
Register
Ask a Question
Recent questions and answers in Secure Programming Practices
0
votes
1
answer
Security check can be enforced at compile time by:
answered
Aug 28, 2022
in
Secure Programming Practices
by
sharadyadav1986
security-check
security
secure-programming-practices
0
votes
1
answer
Identify the correct statement in the following on secure-programming
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
1
answer
From application security perspective, why should a CAPTCHA be used in a web application?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
application-security
captcha-security
secure-programming-practices
0
votes
1
answer
To improve the overall quality of web applications, developers should abide by which of the following rules?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
web-application
web-security
secure-programming-practices
0
votes
1
answer
Identify the correct statement in the following:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
2
answers
Securing a database application with username/password access control should be considered
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
ssa
secure-programming
0
votes
1
answer
It is a good programming practice to prevent caching of sensitive data at client or proxies, by implementing which of the following?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-practice
0
votes
1
answer
What is the purpose of Audit Trail and Logging?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
audit-trail
audit-logging
0
votes
1
answer
Secure practices for access control include which of the following?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-practices
access-control
secure-programming-practices
0
votes
1
answer
Which of the followings are secure programming guidelines?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-guidelines
0
votes
1
answer
There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
1
answer
Which of the following is not an authentication method?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication-method
0
votes
1
answer
If an attacker submits multiple input parameters (query string, post data, cookies, etc) of the same name, the application may react in unexpected ways and open up new avenues of server-side
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
session-hijack
session-attack
+1
vote
1
answer
Exception Handling refers to:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
exception-handling
exception
error-handling
0
votes
1
answer
Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
string-attack
web-application-attack
secure-programming-practices
0
votes
1
answer
Authentication and session management are security concerns of which of the following programming languages?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication
session-management
0
votes
1
answer
Identify the correct statement in the following:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
1
answer
What forces the user to change password at first login?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which happens first authorization or authentication?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Grant limited permission to specified account A. File Shredding B. File sharing and permission C. File corrupting D. File integrity
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What does Light Directory Access Protocol (LDAP) doesn’t store?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is a strong password?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What is not a good practice for user administration?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
_ is a type of software designed to help the user’s computer detect viruses and avoid them.
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is a good practice?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is least secure method of authentication ?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Why is one time password safe ?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What is characteristic of RADIUS system?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is considered as the unsolicited commercial email?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
To see more, click for all the
questions in this category
.
Recent questions and answers in Secure Programming Practices
...