Questionnaire
0
Votes
1
Ans
You need to ensure that domain-linked GPOs are not blocked in subordinate OUs.What should you do?
464 viewsUday Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are the best practices for secure user authentication?
696 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which JDBC class can help to prevent SQL injection attacks?
677 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What are the best practices for secure password storage?
643 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are the best practices for maintaining data confidentiality in Java?
694 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following is true for secure caller access in Java?
727 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following should you do in development, but not in production code, when working with security contexts?
702 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the default Java policy file?
694 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What should programmers be aware of when using containers?
693 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are the best practices for working with doPrivileged?
685 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are true for the Java permissions model?
680 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What are the best practices for implementing Secure Network Communications in Java applications?
657 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which statement regarding XSS attacks is correct?
698 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which term best describes the problem associated with XSS?
686 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the end result of a XSS attack? Choose two.
631 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the main cause of XSS vulnerabilities?
658 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the first step in a XSS attack?
625 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the first step in a CSRF attack?
673 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the result of CSRF attacks?
605 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Where should developers use randomized tokens to mitigate CSRF attacks?
670 viewsShubham Haldkar Changed status to publish