Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Secure Programming Practices Interview Questions and Answers
Home
Questions
Secure Programming Practices
0
votes
Q: Security check can be enforced at compile time by:
answered
Aug 28, 2022
in
Secure Programming Practices
by
sharadyadav1986
security-check
security
secure-programming-practices
0
votes
Q: Identify the correct statement in the following on secure-programming
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Q: From application security perspective, why should a CAPTCHA be used in a web application?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
application-security
captcha-security
secure-programming-practices
0
votes
Q: To improve the overall quality of web applications, developers should abide by which of the following rules?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
web-application
web-security
secure-programming-practices
0
votes
Q: Identify the correct statement in the following:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Q: Securing a database application with username/password access control should be considered
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
ssa
secure-programming
0
votes
Q: It is a good programming practice to prevent caching of sensitive data at client or proxies, by implementing which of the following?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-practice
0
votes
Q: What is the purpose of Audit Trail and Logging?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
audit-trail
audit-logging
0
votes
Q: Secure practices for access control include which of the following?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-practices
access-control
secure-programming-practices
0
votes
Q: Which of the followings are secure programming guidelines?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-guidelines
0
votes
Q: There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
Q: Which of the following is not an authentication method?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication-method
0
votes
Q: If an attacker submits multiple input parameters (query string, post data, cookies, etc) of the same name, the application may react in unexpected ways and open up new avenues of server-side
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
session-hijack
session-attack
+1
vote
Q: Exception Handling refers to:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
exception-handling
exception
error-handling
0
votes
Q: Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
string-attack
web-application-attack
secure-programming-practices
0
votes
Q: Authentication and session management are security concerns of which of the following programming languages?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication
session-management
0
votes
Q: Identify the correct statement in the following:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Q: What forces the user to change password at first login?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which happens first authorization or authentication?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Grant limited permission to specified account A. File Shredding B. File sharing and permission C. File corrupting D. File integrity
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: What does Light Directory Access Protocol (LDAP) doesn’t store?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a strong password?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: What is not a good practice for user administration?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: _ is a type of software designed to help the user’s computer detect viruses and avoid them.
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a good practice?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is least secure method of authentication ?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Why is one time password safe ?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: What is characteristic of RADIUS system?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is considered as the unsolicited commercial email?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
To see more, click for all the
questions in this category
.
...