Tag: security

Questions Related to security

  1. It does not matter, the web serve will treat all GET requests as POST requests

  2. The information in a POST request cannot be manipulated. It is possible to change a GET request.

  3. A GET request is sent when requesting information; A POST request is sent when sending information

  4. The data is sent in the body of the POST request and in the URL in a GET request


Correct Option: D
  1. White-box testing is performed by an independent programmer team

  2. Black-box testing uses the bottom-up approach

  3. Black-box testing involves the business units

  4. White-box testing examines the program internal logical structures


Correct Option: D
  1. A penetration test enumerates resources, and a vulnerability assessment enumerates vulnerabilities

  2. They are one and the same

  3. A penetration test identifies running services, and vulnerability assessments provide a more in-depth understanding of vulnerabilities

  4. A penetration test exploits vulnerabilities, and a vulnerability assessment finds vulnerabilities


Correct Option: D
  1. cross site scrpting

  2. X site scrpting

  3. spread sheet

  4. Excel site scrpting


Correct Option: A
  1. During testing

  2. During development

  3. During all phases of development starting with requirement analysis and ending with rollout

  4. During design


Correct Option: C

In the ASAP process what is the main activity carried out in the requirement analysis phase?

  1. Capture the customer requirements

  2. Update the project plan

  3. Capture and update the URS and SRS with security requirements for the project

  4. None of the above


Correct Option: C
  1. Time and Money, Fixed price

  2. Offshore, Onshore, Offshore-Onshore

  3. Full-Fledged, Staggered, Fast Track

  4. None of the above


Correct Option: C