Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged Ssa
Home
Tag
Ssa
0
votes
Q: While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
0
votes
Q: Which of the following statements is NOT true regarding error handling and Logging?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
error-handling
error-logging
ssa
0
votes
Q: SAML uses _________ for token exchange
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
saml-token
saml-token-exchange
saml
security-service
ssa
0
votes
Q: Which of the following are threats of cross site scripting on the authentication page?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Both Digital Signature & Message Authentication code (MAC) provides authentication.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
digital-signature
message-authentication-code
mac
ssa
0
votes
Q: State the Correct statement.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
#software-security-education
ssa
security-education
0
votes
Q: What from the following are part of Security Incident Response?
asked
Mar 17, 2021
in
SAP
by
DavidAnderson
ssa
0
votes
Q: Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
vulnerability-type
malicious
script
ssa
0
votes
Q: Which of the following is the name of the process of comparing cryptographic hash functions of system execution?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: Which of the following ensure the authenticity of personal involved in the manipulation of information & later cannot deny the involvement?
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
ssa
0
votes
Q: Both Digital Signature & Message Authentication Code(MAC) Provides Non Repudiation
asked
Mar 17, 2021
by
DavidAnderson
ssa
0
votes
Q: Which of the following is true?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: session cookies with HTTPOnly flag are not vulnerable to ___ attacks, but are vulnerable to _____attack?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: A race condition in a web server can cause which of the following
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Cyclomatic complexity increase by
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
ssa
0
votes
Q: What if the public key , in fact belongs to a malicious third party performing a man-in-the-middle attack? what is countermeasure to avoid this scenario?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Which type of users should be allowed to use system accounts?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Results of Threat modeling carried out during design review should be considered during which of the following phases of SDLC?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Digital signature of a person varies from document to document. state True or false?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
Page:
« prev
1
2
3
...