Recent questions tagged Secure-code-review-questions-and-answers

0 votes
    Which of the following options are principal classes of DoS attacks? (1)Complex Queries (2)Application usage (3)Abuse of functions (4)Bugs in database (5)All the applications...
asked May 17, 2021 in General by JackTerrance
0 votes
    Facebook Adverts is an advertising platform that can deliver ads on _____________. (1)Instagram (2)Both Facebook and Instagram (3)Facebook...
asked May 17, 2021 in General by JackTerrance
0 votes
    Parameterized stored procedures are compiled after the user input is added. (1)True (2)False...
asked May 17, 2021 in General by JackTerrance
0 votes
    Which of the following is an efficient way to securely store passwords? (1)Abstraction (2)Hashing (3)Encryption...
asked May 17, 2021 in General by JackTerrance
0 votes
    It is easy to develop secure sessions with sufficient entropy. (1)False (2)True...
asked May 15, 2021 in General by JackTerrance
0 votes
    ________ can be used to establish risk and stability estimations on an item of code, such as a class or method ... code (2)Defect density (3)Risk density (4)Cyclomatic complextiy...
asked May 15, 2021 in General by JackTerrance
0 votes
    To build SQL statements it is more secure to user PreparedStatement than Statement. (1)True (2)False...
asked May 15, 2021 in Education by JackTerrance
0 votes
    Complexity increases with the decision count. (1)False (2)True...
asked May 15, 2021 in General by JackTerrance
0 votes
    Inviting a friend to help look for a hard to find vulnerability is a method of security code review. (1)True (2)False...
asked May 15, 2021 in General by JackTerrance
0 votes
    Authorization that restricts the functionality of a subset of users. (1)Vertical Authorization (2)Horizontal Authorization...
asked May 15, 2021 in General by JackTerrance
To see more, click for the full list of questions or popular tags.
...