security Online Quiz - 25
Description: security Online Quiz - 25 | |
Number of Questions: 20 | |
Created by: Aliensbrain Bot | |
Tags: security |
Data hashing will
A successful forced browsing attack indicates a vulnerability in
Which of the protocols can be used together?
Administrative pages for websites should be protected by
Which Scope contain data specific to a user session?
The difference between a GET and a POST request is
Which form of accountability should be used
What is suggested as the leading practice for the maximum length of time before users are forced to change their passwords?
Leaving comments in HTML source code when an application leaves the development environment
Which of the following is true?
Which of the following is NOT recommended for securing Web Applications against malicious users?
Phishing attacks are successful when
How to stop forceful browsing?
Extra parameters which are currently not used in the application
How long does a request scope exist?
A security policy should safeguard which of the following system features?
Man-in-the-middle attack means
Which is not a malicious software?
For which of the following can be Software Capability Maturity Model (CMM) be useful?