Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Secure Programming Practices Interview Questions and Answers
Home
Questions
Secure Programming Practices
0
votes
Security check can be enforced at compile time by:
answered
Aug 28, 2022
in
Secure Programming Practices
by
sharadyadav1986
security-check
security
secure-programming-practices
0
votes
Identify the correct statement in the following on secure-programming
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
From application security perspective, why should a CAPTCHA be used in a web application?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
application-security
captcha-security
secure-programming-practices
0
votes
To improve the overall quality of web applications, developers should abide by which of the following rules?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
web-application
web-security
secure-programming-practices
0
votes
Identify the correct statement in the following:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
Securing a database application with username/password access control should be considered
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
ssa
secure-programming
0
votes
It is a good programming practice to prevent caching of sensitive data at client or proxies, by implementing which of the following?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-practice
0
votes
What is the purpose of Audit Trail and Logging?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
audit-trail
audit-logging
0
votes
Secure practices for access control include which of the following?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-practices
access-control
secure-programming-practices
0
votes
Which of the followings are secure programming guidelines?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming-guidelines
0
votes
There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
Which of the following is not an authentication method?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication-method
0
votes
If an attacker submits multiple input parameters (query string, post data, cookies, etc) of the same name, the application may react in unexpected ways and open up new avenues of server-side
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
session-hijack
session-attack
+1
vote
Exception Handling refers to:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
exception-handling
exception
error-handling
0
votes
Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
string-attack
web-application-attack
secure-programming-practices
0
votes
Authentication and session management are security concerns of which of the following programming languages?
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication
session-management
0
votes
Identify the correct statement in the following:
answered
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
secure-programming
0
votes
What forces the user to change password at first login?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which happens first authorization or authentication?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Grant limited permission to specified account A. File Shredding B. File sharing and permission C. File corrupting D. File integrity
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What does Light Directory Access Protocol (LDAP) doesn’t store?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is a strong password?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What is not a good practice for user administration?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
_ is a type of software designed to help the user’s computer detect viruses and avoid them.
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is a good practice?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is least secure method of authentication ?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Why is one time password safe ?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
What is characteristic of RADIUS system?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Which of the following is considered as the unsolicited commercial email?
answered
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
To see more, click for all the
questions in this category
.
...