Tag: security

Questions Related to security

  1. Create a hash of the document and encrypt the resulting hash using the signer's private key

  2. Encrypt the document using the signer's private key

  3. Encrypt the document using the signer's private key and create a hash of the encrypted document

  4. Encrypt the document using the signer's public key


Correct Option: A

Identify vulnerability for code below Class Execclass { public static void main (String args []) { Runtime rt = Runtime.getRuntime (); Process proc = rt.exec ("cmd.exe /C") ;} }

  1. Buffer Overflow

  2. Command Injection

  3. CSRF

  4. XSS

  5. XST


Correct Option: B

In a J2EE web application Error page is defined in

  1. Server.xml

  2. config.xml

  3. web.xml

  4. application.properties


Correct Option: C
  1. Milliseconds

  2. Seconds

  3. Minutes

  4. Hours


Correct Option: C