Tag: security
Questions Related to security
-
Page Scope
-
Session Scope
-
Request Scope
-
Application Scope
-
Depends on how it is used
-
Stateful protocol
-
Transport Layer protocol
-
Stateless protocol
-
It does not matter, the web serve will treat all GET requests as POST requests
-
The information in a POST request cannot be manipulated. It is possible to change a GET request
-
A GET request is sent when requesting information; A POST request is sent when sending information
-
The data is sent in the body of the POST request and in the URL in a GET request
-
Sent to the user in a hidden field so that tech support can retrieve the information later
-
Destroyed if it occurs to minimize the chances that this information might be inadvertently disclosed
-
Logged on the server side
-
A and C
-
WADL, WSDL, SAML
-
UDDI, WADL, WSDL
-
SOAP, SAML, WADL
-
WSDL, SOAP, SAML
-
Accounts for each user
-
Account for each group of users
-
Accounts for each business unit
-
None of the above
-
An administrative interface to an application
-
When two users access each other's information
-
A loop hole within an application that allows users to bypass the standard security flow by way of a secret token or identifier
-
The connection between the application and the database
-
A backdoor
-
An access control vulnerability
-
A buffer over flow
-
A SQL injection vulnerability
-
60 days
-
180 days
-
120 days
-
90 days
-
Is a good programming practice
-
Is very useful during code reviews
-
Is the recommended practice for secure code maintenance
-
May give the attacker valuable information to perform an exploit