Tag: security
Questions Related to security
-
It does not matter, the web serve will treat all GET requests as POST requests
-
The information in a POST request cannot be manipulated. It is possible to change a GET request.
-
A GET request is sent when requesting information; A POST request is sent when sending information
-
The data is sent in the body of the POST request and in the URL in a GET request
-
White-box testing is performed by an independent programmer team
-
Black-box testing uses the bottom-up approach
-
Black-box testing involves the business units
-
White-box testing examines the program internal logical structures
-
Gray-box testing
-
Black-box testing
-
White-box testing
-
None of these
-
A penetration test enumerates resources, and a vulnerability assessment enumerates vulnerabilities
-
They are one and the same
-
A penetration test identifies running services, and vulnerability assessments provide a more in-depth understanding of vulnerabilities
-
A penetration test exploits vulnerabilities, and a vulnerability assessment finds vulnerabilities
-
cross site scrpting
-
X site scrpting
-
spread sheet
-
Excel site scrpting
-
During testing
-
During development
-
During all phases of development starting with requirement analysis and ending with rollout
-
During design
-
Capture the customer requirements
-
Update the project plan
-
Capture and update the URS and SRS with security requirements for the project
-
None of the above
-
ASAP Team
-
Development Team
-
Testing Team
-
Project Management
-
Time and Money, Fixed price
-
Offshore, Onshore, Offshore-Onshore
-
Full-Fledged, Staggered, Fast Track
-
None of the above
-
Dynamic code analysis
-
Static code analysis
-
Both
-
None