Tag: technology
Questions Related to technology
-
Vulnerable to SQL Injection
-
Vulnerable to DoS
-
Vulnerable to Information Disclosure
-
Code is secure
-
Security is handled at OS level by giving only read level privilege so no need to put an extra check here
-
Only problem here is that fileName may not be syntactically incorrect so it should be validated before using it in the function
-
This code can lead to information disclosure attack
-
Java provides enough security by default for IO operations so this code is not vulnerable.
-
Subject.doAs()
-
AccessController.checkPermission()
-
SecurityManager.checkAccess()
-
None of the above
-
The type safety mechanism in the Java language prevents the execution of malicious code
-
Two classes with the same fully qualified name but which are defined by different instances of a class loader are NOT of the same type
-
All signed classes are implicitly trusted and granted full access
-
The principal role of a TrustManager is to determine if presented authentication credentials should be trusted
-
Option 1 AND Option 4
-
Option 2 AND Option 4
-
securitymanager
-
policytool
-
jarsigner
-
keystore
-
None of the above
-
Create a hash of the document and encrypt the resulting hash using the signer's private key
-
Encrypt the document using the signer's private key
-
Encrypt the document using the signer's private key and create a hash of the encrypted document
-
Encrypt the document using the signer's public key
-
Struts 1.1
-
Struts 1.2
-
Struts 2
-
JSF
-
Prevval
-
Currval
-
Newval
-
Lastval