What type of testing is done by ASAP team during the testing and rollout phase?
Integration testing
System testing
Penetration testing
Unit testing
Whats the name of the TCS security library available for the remediation of security vulnerabilities?
TCS Security API
TCS Security Library
TCS Application Security API
TCS e-Security Library
As per the ASAP Process what all artifacts are provided to help aid in the analysis phase?
Security URS
Security URS and SRS
Security Design Guidelines
All of the above
Who does the review of the security elements of the updated project artifacts at the end of each phase of the application development life cycle?
Application development team
Project Manager
ASAP Team
Testing Team
What is TCS ASAP all about?
Its a TCS proprietary methodology
Its a security framework
Its about security testing
Its a product from TCS
The three steps to successful patch management are …
Acquiring, Testing, Installing
Testing, Remediation, Peer Review
Determine needs, Acquire resources, Install the patch
Both A & B
The correct way to disable autocomplete in the browser for certain forms is to ….
Set autocomplete to “0”
Set autocomplete to “Off”
Set autocomplete to some other value
Set autocomplete to “no-store”
Which of the following is appropriate for customer emails regarding a limited time promotional offer?
Request that the user authenticate him/herself by replying to the email with their account credentials.
Personalized greeting line
Providing easy access to the customer's account via a “Click Here” style link
Sending the email from a domain set up specifically for the special offer
Credit card numbers should be logged into the log file during exception
No. Because leads to insecure storage of private information of the customer
Yes. Because it is a good logging practice to log all relevant information during an exception
Yes. Because it will help in troubleshooting specific customer problems
No. Because its an additional over head
A race condition in a web server can cause …
Resources to become unavailable to legitimate users
Cross Site Tracing
Server Instability
Both A and B