Hi Guest

MobileUser

1 HomePage 1 Jobs 1 WalkIn 1Articles  

Node.JS Books
Special Offer
Laptop Lenovo
GATE Exam

Cat Exam
Start a Blog
Develop Your Skill

Develop Your Skill

SQL Books

Develop Your Skill

 :) Latest Topic
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
 leftlink
 :) Topic of Day
 
 :) Hot Jobs
 :)
 :) Most Searchable
 


 :) Quiz System
Computer Quiz
Science Quiz
Banking Quiz
Sports Quiz
GK Quiz


  

 
___________ can be exploited to completely ignore authorization constraints. View:-75819
Question Posted on 23 Jul 2020

___________ can be exploited to completely ignore authorization constraints.
Choose the correct option fr....
ADS Posted In : Software | Secure Code Review



Defect density alone can be used to judge the security of code accurately. View:-66304
Question Posted on 22 Jul 2020

Defect density alone can be used to judge the security of code accurately.
Choose the correct option from....
ADS Posted In : Software | Secure Code Review


Which of the following are threats of cross site scripting on the authentication page? View:-55844
Question Posted on 18 Jul 2020

Which of the following are threats of cross site scripting on the authentication page?
Choose the correct....
ADS Posted In : Software | Secure Code Review


The process through which the identity of an entity is established to be genuine. View:-51671
Question Posted on 04 Aug 2020

The process through which the identity of an entity is established to be genuine.
Choose the correct opti....
ADS Posted In : Software | Secure Code Review


The process by which different equivalent forms of a name can be resolved to a single standard name, View:-76040
Question Posted on 02 Aug 2020

The process by which different equivalent forms of a name can be resolved to a single standard name,
Choo....
ADS Posted In : Software | Secure Code Review


Numerical values that describe a trait of the code such as the Lines of Code come under ________. View:-32369
Question Posted on 16 Jul 2020

Numerical values that describe a trait of the code such as the Lines of Code come under ________.
Choose ....
ADS Posted In : Software | Secure Code Review


The information gathered should be organized into a _________ that can be used to prioritize the review. View:-59139
Question Posted on 16 Jul 2020

The information gathered should be organized into a _________ that can be used to prioritize the review.
....
ADS Posted In : Software | Secure Code Review


The estimation of software size by measuring functionality. View:-50383
Question Posted on 31 Jul 2020

The estimation of software size by measuring functionality.
Choose the correct option from below list
ADS Posted In : Software | Secure Code Review


The first step in analyzing the attack surface is ________. View:-69991
Question Posted on 30 Jul 2020

The first step in analyzing the attack surface is ________.
Choose the correct option from below list
ADS Posted In : Software | Secure Code Review


The account used to make the database connection must have______ privilege. View:-68157
Question Posted on 29 Jul 2020

The account used to make the database connection must have______ privilege.
Choose the correct option fro....
ADS Posted In : Software | Secure Code Review


Which of the following type of metrics do not involve subjective context but are material facts? View:-48102
Question Posted on 29 Jul 2020

Which of the following type of metrics do not involve subjective context but are material facts?
Choose t....
ADS Posted In : Software | Secure Code Review


A solution to enhance security of passwords stored as hashes. View:-58792
Question Posted on 28 Jul 2020

A solution to enhance security of passwords stored as hashes.
Choose the correct option from below list <....
ADS Posted In : Software | Secure Code Review


A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of wh View:-63463
Question Posted on 27 Jul 2020

A representation of an attribute that cannot be measured directly, and are subjective and dependent on the co....
ADS Posted In : Software | Secure Code Review


Authorization that restricts the functionality of a subset of users. View:-60027
Question Posted on 25 Jul 2020

Authorization that restricts the functionality of a subset of users.
Choose the correct option from below....
ADS Posted In : Software | Secure Code Review


Which of the following is more resistant to SQL injection attacks? View:-53476
Question Posted on 17 Jul 2020

Which of the following is more resistant to SQL injection attacks?
Choose the correct option from below l....
ADS Posted In : Software | Secure Code Review


The average occurrance of programming faults per Lines of Code View:-65790
Question Posted on 17 Jul 2020

The average occurrance of programming faults per Lines of Code

(LOC) is known as _______.
Choos....
ADS Posted In : Software | Secure Code Review


Inviting a friend to help look for a hard to find vulnerability is a method of security code review. View:-45468
Question Posted on 05 Aug 2020

Inviting a friend to help look for a hard to find vulnerability is a method of security code review.
Cho....
ADS Posted In : Software | Secure Code Review


The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the applicat View:-67455
Question Posted on 05 Aug 2020

The approach to input validation that simply encodes characters considered "bad" to a format which should not....
ADS Posted In : Software | Secure Code Review


It is easy to distinguish good code from insecure code. View:-48662
Question Posted on 01 Aug 2020

It is easy to distinguish good code from insecure code.
Choose the correct option from below list
(1)....
ADS Posted In : Software | Secure Code Review


Complexity increases with the decision count. View:-49699
Question Posted on 30 Jul 2020

Complexity increases with the decision count.
Choose the correct option from below list
(1)False
....
ADS Posted In : Software | Secure Code Review


The process that gives a person permission to perform a functionality is known as ----------- View:-0
Question Posted on 29 Jul 2020

The process that gives a person permission to perform a functionality is known as -----------
Choose the ....
ADS Posted In : Software | Secure Code Review


To build SQL statements it is more secure to user PreparedStatement than Statement. View:-64689
Question Posted on 27 Jul 2020

To build SQL statements it is more secure to user PreparedStatement than Statement.
Choose the correct op....
ADS Posted In : Software | Secure Code Review


________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a View:-68588
Question Posted on 25 Jul 2020

________ can be used to establish risk and stability estimations on an item of code, such as a class or metho....
ADS Posted In : Software | Secure Code Review


It is easy to develop secure sessions with sufficient entropy. View:-74203
Question Posted on 24 Jul 2020

It is easy to develop secure sessions with sufficient entropy.
Choose the correct option from below list ....
ADS Posted In : Software | Secure Code Review


Which of the following is an efficient way to securely store passwords? View:-56094
Question Posted on 23 Jul 2020

Which of the following is an efficient way to securely store passwords?
Choose the correct option from be....
ADS Posted In : Software | Secure Code Review


Parameterized stored procedures are compiled after the user input is added. View:-68293
Question Posted on 21 Jul 2020

Parameterized stored procedures are compiled after the user input is added.
Choose the correct option fro....
ADS Posted In : Software | Secure Code Review


Which of the following can be used to prevent end users from entering malicious scripts? View:-62381
Question Posted on 20 Jul 2020

Which of the following can be used to prevent end users from entering malicious scripts?
Choose the corre....
ADS Posted In : Software | Secure Code Review


In a multi user multi threaded environment, thread safety is important as one may erroneously gain access to another ind View:-77852
Question Posted on 19 Jul 2020

In a multi user multi-threaded environment, thread safety is important as one may erroneously gain access to ....
ADS Posted In : Software | Secure Code Review


The _______ approach to validation only permits characters/ASCII ranges defined within a white-list. View:-72152
Question Posted on 18 Jul 2020

The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
Choo....
ADS Posted In : Software | Secure Code Review


1
 
  
 :) Categoriese
 :) Most Visited Questions