Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged secure-code-review
Home
Tag
secure-code-review
0
votes
Q: Which of the following type of metrics do not involve subjective context but are material facts?
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
secure-code-review
absolute-metrics
0
votes
Q: A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
(
23.9k
points)
secure-code-review
code-review
0
votes
Q: ________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
secure-code-review
cyclometric-complexity
0
votes
Q: The account used to make the database connection must have ______ privilege.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
secure-code-review
database-connection
database-privilege
0
votes
Q: Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
(
23.9k
points)
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
Q: Which of the following is an efficient way to securely store passwords?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
#password-security
secure-code-review
0
votes
Q: A function in which scripting tags in all dynamic content can be replaced with codes in a chosen character set.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
(
23.9k
points)
#dynamic-coding
secure-code-review
DataHandling-questions-answers
0
votes
Q: A solution to enhance security of passwords stored as hashes.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
#code-security
secure-code-review
0
votes
Q: The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
(
23.9k
points)
#encoding
secure-code-review
DataHandling-questions-answers
0
votes
Q: Defect density alone can be used to judge the security of code accurately.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
(
23.9k
points)
#defect-density
secure-code-review
DataHandling-questions-answers
0
votes
Q: Parameterized stored procedures are compiled after the user input is added.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
#parameterized-store
secure-code-review
0
votes
Q: __________ attempts to quantify the size of the code.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
#code-size
secure-code-review
code-review
size-code
0
votes
Q: Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
#sql-injection-attack
secure-code-review
code-review
0
votes
Q: The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
(
23.9k
points)
#code-permission
secure-code-review
To see more, click for the
full list of questions
or
popular tags
.
...