Tag: technology
Questions Related to technology
Mitigating the risk of one security control being compromised by providing multiple layers of security controls is an example of what specific security strategy?
Hash is define as
Which of the following involves validating the positive and negative requirements of the software?
Which of the following techniques is used to trace system calls as the software is executing?
George obtains code that steals user session keys. He is able to post the code on a compromised website where Alice has an account. When she accesses the site he session key is sent to George? What type of attack is this ?
There are various HTTP authentication mechanisms to authenticate the user towards web application. Which of the following authentication schemes where login / password credentials are sent to the web server in clear text ?