Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged Ssa
Home
Tag
Ssa
0
votes
Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
spoofing
threat-modeling
ssa
0
votes
Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
confidential-information
security
ssa
0
votes
Which of the following is used to retain integrity in a software?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
software-integrity
software-security
ssa
0
votes
State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
threat-modeling
ssa
secure-software
0
votes
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
threat-modeling
spoofing
security
ssa
0
votes
Why is it not a good idea to include readymade code from Google search into the customer application deliverables even though it may save a lot of time and cost for the project?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
google-search
threat-modeling
ssa
0
votes
SSA takes care of the threats to the systems and softwares from?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
ssa
threats
security-threats
0
votes
Which vulnerability can lead to Denial of Service attack?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
denial-of-service-attack
dos-attack
ssa
0
votes
Security code review should be done throughout the SDLC.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
#security-code
sdlc-security-code-review
ssa
0
votes
Identify Correct statement:
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
threat-modeling
ssa
sql-injection-attack
0
votes
The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
#validations
threat-modeling
ssa
ascii-range
0
votes
Select the Correct statement.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
(
30.5k
points)
threat-modeling
ssa
authorization
+1
vote
Diffie-hellman algorithm is used for?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
How can a confidential message be securely distributed?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Error Handlinug reveal stack traces or other overlay informative error message to users. this will be categorized under security Misconfiguration?
asked
Mar 17, 2021
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Which of the following is a digital signature algorithm?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
0
votes
Asymmetric Key Encryption/Decryption requires?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
(
7.4k
points)
ssa
Page:
1
2
3
next »
...