Login
Remember
Register
User rajeshsharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by rajeshsharma
+1
vote
0
answers
What is SetToProperty in QTP
asked
Apr 13, 2020
in
QuickTest Professional (QTP)
#qtp-settoproperty
0
votes
0
answers
Give the syntax to import/export xls into QTP.
asked
Apr 13, 2020
in
QuickTest Professional (QTP)
#qtp-import
#qtp-export
0
votes
0
answers
Can launch two instances of QTP on the same machine?
asked
Apr 13, 2020
in
QuickTest Professional (QTP)
#qtp-instances
0
votes
0
answers
How would you export a Script from one PC to another in QTP?
asked
Apr 13, 2020
in
QuickTest Professional (QTP)
#qtp-script
0
votes
0
answers
What is smart Identification in QTP?
asked
Apr 13, 2020
in
QuickTest Professional (QTP)
#qtp-identification
0
votes
0
answers
What is GetRoProperty in QTP?
asked
Apr 13, 2020
in
QuickTest Professional (QTP)
#qtp-getroproperty
0
votes
0
answers
selenium webdriver python documentation
asked
Apr 13, 2020
in
Selenium
#selenium-python-documentation
0
votes
0
answers
selenium webdriver python example
asked
Apr 13, 2020
in
Selenium
#selenium-websriver-example
0
votes
0
answers
selenium webdriver python tutorial
asked
Apr 13, 2020
in
Selenium
#selenium-webdriver-python
0
votes
1
answer
Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
1
answer
Which of the following is an efficient way to securely store passwords?
asked
Apr 3, 2020
in
Secure Code Review
#password-security
secure-code-review
0
votes
0
answers
To build SQL statements it is more secure to user PreparedStatement than Statement.
asked
Apr 3, 2020
in
Data Handling
#sql-build
DataHandling-questions-answers
0
votes
1
answer
A function in which scripting tags in all dynamic content can be replaced with codes in a chosen character set.
asked
Apr 3, 2020
in
Data Handling
#dynamic-coding
secure-code-review
DataHandling-questions-answers
0
votes
1
answer
The average occurrance of programming faults per Lines of Code (LOC) is known as _______.
asked
Apr 3, 2020
in
Secure Code Review
#defect-density
code-review
secue-code-review
0
votes
1
answer
A solution to enhance security of passwords stored as hashes.
asked
Apr 3, 2020
in
Secure Code Review
#code-security
secure-code-review
0
votes
1
answer
The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
asked
Apr 3, 2020
in
Data Handling
#encoding
secure-code-review
DataHandling-questions-answers
0
votes
0
answers
The first step in analyzing the attack surface is ________.
asked
Apr 3, 2020
in
Data Handling
#code-analysis
DataHandling-questions-answers
0
votes
1
answer
Defect density alone can be used to judge the security of code accurately.
asked
Apr 3, 2020
in
Data Handling
#defect-density
secure-code-review
DataHandling-questions-answers
0
votes
0
answers
Which of the following can be used to prevent end users from entering malicious scripts?
asked
Apr 3, 2020
in
Data Handling
#data-validation
DataHandling-questions-answers
0
votes
1
answer
Parameterized stored procedures are compiled after the user input is added.
asked
Apr 3, 2020
in
Secure Code Review
#parameterized-store
secure-code-review
0
votes
1
answer
__________ attempts to quantify the size of the code.
asked
Apr 3, 2020
in
Secure Code Review
#code-size
secure-code-review
code-review
size-code
0
votes
1
answer
Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
#sql-injection-attack
secure-code-review
code-review
0
votes
1
answer
The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
#code-permission
secure-code-review
0
votes
0
answers
The process by which different equivalent forms of a name can be resolved to a single standard name,
asked
Apr 3, 2020
in
Data Handling
#code-canonicalization
DataHandling-questions-answers
0
votes
0
answers
Authorization that restricts the functionality of a subset of users.
asked
Apr 3, 2020
in
Data Handling
#code-authorization
DataHandling-questions-answers
0
votes
0
answers
The process through which the identity of an entity is established to be genuine.
asked
Apr 3, 2020
in
Data Handling
#code-identity
DataHandling-questions-answers
0
votes
0
answers
Which of the following are threats of cross site scripting on the authentication page?
asked
Apr 3, 2020
in
Data Handling
#code-authentication-page
DataHandling-questions-answers
0
votes
0
answers
The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Apr 3, 2020
in
Data Handling
#code-characteristics-range
DataHandling-questions-answers
0
votes
0
answers
In a multi user multi-threaded environment, thread safety is important as one may erroneously gain access to another individuals session by exploiting ___________ .
asked
Apr 3, 2020
in
Data Handling
#code-thread-safety
DataHandling-questions-answers
0
votes
0
answers
Inviting a friend to help look for a hard-to-find vulnerability is a method of security code review.
asked
Apr 3, 2020
in
Data Handling
#code-vulnearability
DataHandling-questions-answers
Page:
« prev
1
...
127
128
129
130
131
132
133
134
135
136
137
...
187
next »
...