Tag: security

Questions Related to security

  1. Check authorization on each page

  2. Name files with un-guessable names

  3. Place all accessible files in the same directory

  4. ACL's on the web root


Correct Option: A
  1. Is necessary to check some functionalities during the testing and production support

  2. May lead to security breaches

  3. Do not consume significant bandwidth and so can be allowed in the application

  4. Is necessary in case the application needs a future addition


Correct Option: B
  1. The length of the User's Session

  2. The length of a single HTTP response

  3. The length of a single HTTP request

  4. Until the server is rebooted


Correct Option: C
  1. White-box testing is performed by an independent programmer team

  2. Black-box testing uses the bottom-up approach

  3. Black-box testing involves the business units

  4. White-box testing examines the program internal logical structures


Correct Option: D
  1. A penetration test enumerates resources, and a vulnerability assessment enumerates vulnerabilities

  2. They are one and the same

  3. A penetration test identifies running services, and vulnerability assessments provide a more in-depth understanding of vulnerabilities

  4. A penetration test exploits vulnerabilities, and a vulnerability assessment finds vulnerabilities


Correct Option: D
  1. String hashPassword(String password)

  2. String hashPassword(String password, String accountName)

  3. String hashpassword(String password)

  4. None of the above


Correct Option: B