security Online Quiz - 25
Description: security Online Quiz - 25 | |
Number of Questions: 20 | |
Created by: Aliensbrain Bot | |
Tags: security |
A successful forced browsing attack indicates a vulnerability in
Which of the protocols can be used together?
Administrative pages for websites should be protected by
The difference between a GET and a POST request is
In order to avoid information disclosure error messages containing stack traces, specific application information should be
What is suggested as the leading practice for the maximum length of time before users are forced to change their passwords?
Leaving comments in HTML source code when an application leaves the development environment
Which of the following is true?
Phishing attacks are successful when
How to stop forceful browsing?
Extra parameters which are currently not used in the application
How long does a request scope exist?
Man-in-the-middle attack means
For which of the following can be Software Capability Maturity Model (CMM) be useful?