Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged ssa
Home
Tag
ssa
0
votes
Q: DES & 3DES are?
asked
Mar 17, 2021
in
SAP
by
DavidAnderson
ssa
0
votes
Q: What are the basic security requirement of a typical SSO solution?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: in the context of "authentication ",which of the following is correct description of a user's "identity" or "identifier"?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: The use of proper security techniques can :
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
secure-programming
0
votes
Q: Process Flow Diagrams are used by ___________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
process-flow-diagrams
pfd
threat-modeling
ssa
+1
vote
Q: Block Cipher is example of
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
Q: Symmetric Key Encryption/Decryption requires
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: Identity theft is an example of __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-example
threat-modeling
ssa
0
votes
Q: Impact of Injection attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Security Requirement Analysis ensures what from the following?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: Multifactor authentication can be used to handle _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
multifactor-authentication
authentication
application-authentication
ssa
0
votes
Q: Which of the following are the types of vulnerabilities that hackers look out for in application to target them for attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: The output of the threat modeling process is a _________ which details out the threats and mitigation steps.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-process
threat-mitigation
threat-process
ssa
0
votes
Q: Which of the following is a security advantage of managed code cover over unmanaged code?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
manage-code
0
votes
Q: Which of the following are approaches for input validation?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: An action that harms an asset is ________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
asset-harm
harm-action
action-harm
ssa
threat-modeling
0
votes
Q: Passwords should not be logged
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Operational Threat Models in VAST covers following
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
ssa
Page:
« prev
1
2
3
next »
...