Tag: security

Questions Related to security

  1. Web Proxy

  2. XSS Scanner

  3. An insecure J2EE web application

  4. None of the above


Correct Option: C
  1. Group based access control should be implemented to assign permissions to application users

  2. Consistent authorization checking should be performed on all application pages

  3. A set of all allowable actions should be defined for each user role and all other's denied

  4. All failed access authorization requests should be logged to a secure location for review by administrators


Correct Option: C
  1. During testing

  2. During development

  3. During all phases of development starting with requirement analysis and ending with rollout

  4. During design


Correct Option: C
  1. Capture the customer requirements

  2. Update the project plan

  3. Capture and update the URS and SRS with security requirements for the project

  4. None of the above


Correct Option: C
  1. Time and Money, Fixed price

  2. Offshore, Onshore, Offshore-Onshore

  3. Full-Fledged, Staggered, Fast Track

  4. None of the above


Correct Option: C