Login
Remember
Register
User rajeshsharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by rajeshsharma
0
votes
0
answers
Secure Programming Practices Interview Questions and Answers
asked
Mar 15, 2021
in
Secure Programming Practices
secure-programming-practices
secure-programming-techniques
spt-questions
0
votes
0
answers
Which of the following algorithm/encryption method is the safest to use?
asked
Mar 15, 2021
in
Secure Programming Practices
algorithm-secure
encryption
secure-programming-practices
0
votes
0
answers
Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
secure-program
secure-programming-practices
0
votes
0
answers
On logout, how should an application deal with session cookies?
asked
Mar 15, 2021
in
Secure Programming Practices
session-cookies
application-cookies
security-cookies
secure-programming-practices
0
votes
1
answer
To improve the overall quality of web applications, developers should abide by which of the following rules?
asked
Mar 15, 2021
in
Secure Programming Practices
web-application
web-security
secure-programming-practices
0
votes
1
answer
From application security perspective, why should a CAPTCHA be used in a web application?
asked
Mar 15, 2021
in
Secure Programming Practices
application-security
captcha-security
secure-programming-practices
0
votes
0
answers
Which of the following is true about improper error handling?
asked
Mar 15, 2021
in
Secure Programming Practices
improper-error-handling
eror-handling
secure-programming-practices
0
votes
0
answers
One of the main disadvantages of integrating cryptography into applications is:
asked
Mar 15, 2021
in
Secure Programming Practices
integrity-cryptography
security-application
secure-programming-practices
0
votes
1
answer
Temporarily files created by applications can expose confidential data if:
asked
Mar 15, 2021
in
Secure Programming Practices
#temporarily-files
secure-programming-practices
confidential-data
security-data
0
votes
0
answers
Which of the following is a best practice for Audit Trail and Logging?
asked
Mar 15, 2021
in
Secure Programming Practices
audit-trail
audit-logging
audit
secure-programming-practices
0
votes
1
answer
Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
security-check
security
secure-programming-practices
0
votes
1
answer
There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
asked
Mar 15, 2021
in
Secure Programming Practices
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
0
answers
Which of the following is a security advantage of managed code over unmanaged code?
asked
Mar 15, 2021
in
Secure Programming Practices
security-advantages
managed-code
secure-programming-practices
0
votes
0
answers
Which of the following is not an authorization type?
asked
Mar 15, 2021
in
Secure Programming Practices
authorization-type
user-access
secure-programming-practices
+1
vote
1
answer
Exception Handling refers to:
asked
Mar 15, 2021
in
Secure Programming Practices
exception-handling
exception
error-handling
0
votes
0
answers
Which of the following is the best approach to use when providing access to an SSO application in a portal?
asked
Mar 15, 2021
in
Secure Programming Practices
sso-application
application-access
secure-programming-practices
0
votes
0
answers
Which of the following is not recommended to secure web applications against authenticated users?
asked
Mar 15, 2021
in
Secure Programming Practices
secure-programming-practices
web-applications
0
votes
1
answer
Secure practices for access control include which of the following?
asked
Mar 15, 2021
in
Secure Programming Practices
secure-practices
access-control
secure-programming-practices
0
votes
0
answers
Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
customer-trust
reputation-security
financial-security
compliance-security
secure-programming-practices
0
votes
0
answers
Setting the cookie flag to which of the following mode is a good programming practice?
asked
Mar 15, 2021
in
Secure Programming Practices
cookie-flag
secure-programming-practices
good-programming-practice
0
votes
1
answer
Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
asked
Mar 15, 2021
in
Secure Programming Practices
string-attack
web-application-attack
secure-programming-practices
0
votes
1
answer
Explain what Is The Difference In Accessing Objects Of Lob And Long Datatypes?
asked
Mar 13, 2021
in
PL/SQL
#long-datatypes
plsql-data-types
long-datatypes
0
votes
1
answer
What Will The Result Of The Next() Method, If X Is The Last Element Of The Collection?
asked
Mar 13, 2021
in
PL/SQL
#next-method
element-collection
plsql-elements
plsql-collection
0
votes
1
answer
Can The Exists Method Be Used For Index-by Table?
asked
Mar 13, 2021
in
PL/SQL
#index-by-table
plsql-methods
plsql
0
votes
1
answer
Can Collections Be Compared With Boolean Operators?
asked
Mar 13, 2021
in
PL/SQL
#boolean-operators
plsql-operators
plsql
0
votes
1
answer
Do Collections Have Methods? If Yes, Give An Example ?
asked
Mar 13, 2021
in
PL/SQL
#collection-methods
plsql-methods
0
votes
1
answer
Explain what Is The Difference Between Initialization Of Index-by Table And Nested Table?
asked
Mar 13, 2021
in
PL/SQL
#initialization-table
index-by-table
nested-tables
plsql-nested-tables
0
votes
1
answer
Can An Uninitialized Nested Table Be Referenced?
asked
Mar 13, 2021
in
PL/SQL
#un-initialized-nested-tables
nested-tables
table-by-referenced
plsql-tables
0
votes
1
answer
Can A Varray Be Used In A Record Definition?
asked
Mar 13, 2021
in
PL/SQL
#varay
record-definition
plsql-records
0
votes
1
answer
Do Records Have Methods?
asked
Mar 13, 2021
in
PL/SQL
#records
plsql-records
plsql-methods
Page:
« prev
1
...
113
114
115
116
117
118
119
120
121
122
123
...
187
next »
...