Tag: security

Questions Related to security

  1. Contract Negotiations

  2. Testing phase only

  3. Coding Phase only

  4. All the phases of SDLC


Correct Option: D
  1. vulnerability expliots

  2. malware uploads on user driven sites

  3. internal attacks

  4. all of these


Correct Option: D
  1. Defect Prevention

  2. DAR

  3. Design

  4. Threat Modelling


Correct Option: D
  1. We should first ask the user to supply some details like personal details or ask a hint question. If the credentials supplied are correct, display the old password

  2. We should first ask the user to supply some details like personal details or ask a hint question. If the credentials supplied are correct and the account is not disabled, display the old password

  3. We should first ask the user to supply some details like personal details or ask a hint question. If the credentials supplied are correct and the account is not disabled, then we should send a mail to the users authorized mail id with a link which will t

  4. We should first ask the user to supply some details like personal details or ask a hint question. If the credentials supplied are correct and the account is not disabled, display the new password


Correct Option: C
  1. Persistent cookie information is transmitted thru HTTP

  2. Persistent cookie does not expire when the browser is hard closed.

  3. Persistent cookie are created on harddisk and hence they are readable as a file

  4. No security issue in using Persistent cookie


Correct Option: B
  1. User ID Time stamp Source IP Error codes, if any Priority

  2. User ID , password Time stamp Source IP Error codes, if any Priority

  3. User ID , password Time stamp Source IP Error codes, if any Priority , URL accessed

  4. User ID Time stamp Source IP Error codes, if any Priority , URL accessed, method used, http protocol version, browser type, the referrer page, the response code


Correct Option: D
  1. Vulnerabilities detected on xyz server

  2. Effort slippage

  3. Number of non negligible risks in the application

  4. Total exceptions not handled correctly


Correct Option: B
  1. Open Web Application Security Program

  2. Open Web Application Security Project

  3. Open Source Web Application Security Process

  4. Open Web Application Security Process


Correct Option: B