Tag: security
Questions Related to security
-
Check authorization on each page
-
Name files with un-guessable names
-
Place all accessible files in the same directory
-
ACL's on the web root
-
Is necessary to check some functionalities during the testing and production support
-
May lead to security breaches
-
Do not consume significant bandwidth and so can be allowed in the application
-
Is necessary in case the application needs a future addition
-
The length of the User's Session
-
The length of a single HTTP response
-
The length of a single HTTP request
-
Until the server is rebooted
-
White-box testing is performed by an independent programmer team
-
Black-box testing uses the bottom-up approach
-
Black-box testing involves the business units
-
White-box testing examines the program internal logical structures
-
Grey-box testing
-
Black-box testing
-
White-box testing
-
None of these
-
A penetration test enumerates resources, and a vulnerability assessment enumerates vulnerabilities
-
They are one and the same
-
A penetration test identifies running services, and vulnerability assessments provide a more in-depth understanding of vulnerabilities
-
A penetration test exploits vulnerabilities, and a vulnerability assessment finds vulnerabilities
-
String hashPassword(String password)
-
String hashPassword(String password, String accountName)
-
String hashpassword(String password)
-
None of the above
-
Boolean
-
String
-
Integer
-
void
-
String
-
boolean
-
Integer
-
void
-
Integer
-
Byte
-
String
-
BigInteger