Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Secure Programming Practices Interview Questions and Answers
Home
Questions
Secure Programming Practices
0
votes
Q: Identify the correct statement in the following on secure-programming
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Q: From application security perspective, why should a CAPTCHA be used in a web application?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
application-security
captcha-security
secure-programming-practices
0
votes
Q: To improve the overall quality of web applications, developers should abide by which of the following rules?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
web-application
web-security
secure-programming-practices
0
votes
Q: Identify the correct statement in the following:
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Q: Securing a database application with username/password access control should be considered
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
ssa
secure-programming
0
votes
Q: It is a good programming practice to prevent caching of sensitive data at client or proxies, by implementing which of the following?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-practice
0
votes
Q: What is the purpose of Audit Trail and Logging?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
audit-trail
audit-logging
0
votes
Q: Secure practices for access control include which of the following?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
secure-practices
access-control
secure-programming-practices
0
votes
Q: Which of the followings are secure programming guidelines?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-guidelines
0
votes
Q: There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
Q: Which of the following is not an authentication method?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
authentication-method
0
votes
Q: If an attacker submits multiple input parameters (query string, post data, cookies, etc) of the same name, the application may react in unexpected ways and open up new avenues of server-side
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
session-hijack
session-attack
0
votes
Q: Exception Handling refers to:
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
exception-handling
exception
error-handling
0
votes
Q: Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
string-attack
web-application-attack
secure-programming-practices
0
votes
Q: Authentication and session management are security concerns of which of the following programming languages?
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
authentication
session-management
0
votes
Q: Identify the correct statement in the following:
answered
Mar 9
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Q: What forces the user to change password at first login?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which happens first authorization or authentication?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Grant limited permission to specified account A. File Shredding B. File sharing and permission C. File corrupting D. File integrity
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: What does Light Directory Access Protocol (LDAP) doesn’t store?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a strong password?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: What is not a good practice for user administration?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: _ is a type of software designed to help the user’s computer detect viruses and avoid them.
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a good practice?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is least secure method of authentication ?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Why is one time password safe ?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: What is characteristic of RADIUS system?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is considered as the unsolicited commercial email?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which one of the following can be considered as the class of computer threats?
answered
Feb 6
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
To see more, click for all the
questions in this category
.
...