Tag: security

Questions Related to security

  1. It does not matter, the web serve will treat all GET requests as POST requests

  2. The information in a POST request cannot be manipulated. It is possible to change a GET request.

  3. A GET request is sent when requesting information; A POST request is sent when sending information

  4. The data is sent in the body of the POST request and in the URL in a GET request


Correct Option: D
  1. White-box testing is performed by an independent programmer team

  2. Black-box testing uses the bottom-up approach

  3. Black-box testing involves the business units

  4. White-box testing examines the program internal logical structures


Correct Option: D
  1. A penetration test enumerates resources, and a vulnerability assessment enumerates vulnerabilities

  2. They are one and the same

  3. A penetration test identifies running services, and vulnerability assessments provide a more in-depth understanding of vulnerabilities

  4. A penetration test exploits vulnerabilities, and a vulnerability assessment finds vulnerabilities


Correct Option: D
  1. cross site scrpting

  2. X site scrpting

  3. spread sheet

  4. Excel site scrpting


Correct Option: A
  1. During testing

  2. During development

  3. During all phases of development starting with requirement analysis and ending with rollout

  4. During design


Correct Option: C
  1. Capture the customer requirements

  2. Update the project plan

  3. Capture and update the URS and SRS with security requirements for the project

  4. None of the above


Correct Option: C
  1. Time and Money, Fixed price

  2. Offshore, Onshore, Offshore-Onshore

  3. Full-Fledged, Staggered, Fast Track

  4. None of the above


Correct Option: C