Login
Remember
Register
Ask a Question
Recent questions tagged ssa
0
votes
1
answer
Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
1
answer
Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
1
answer
Which of the following is used to retain integrity in a software?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
software-integrity
software-security
ssa
0
votes
1
answer
State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
secure-software
0
votes
1
answer
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
1
answer
Why is it not a good idea to include readymade code from Google search into the customer application deliverables even though it may save a lot of time and cost for the project?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
google-search
threat-modeling
ssa
0
votes
1
answer
SSA takes care of the threats to the systems and softwares from?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
ssa
threats
security-threats
0
votes
1
answer
Which vulnerability can lead to Denial of Service attack?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
denial-of-service-attack
dos-attack
ssa
0
votes
1
answer
Security code review should be done throughout the SDLC.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#security-code
sdlc-security-code-review
ssa
0
votes
1
answer
Identify Correct statement:
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
sql-injection-attack
0
votes
1
answer
The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#validations
threat-modeling
ssa
ascii-range
0
votes
1
answer
Select the Correct statement.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
authorization
+1
vote
1
answer
Diffie-hellman algorithm is used for?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
1
answer
How can a confidential message be securely distributed?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
1
answer
Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
1
answer
Error Handlinug reveal stack traces or other overlay informative error message to users. this will be categorized under security Misconfiguration?
asked
Mar 17, 2021
by
DavidAnderson
ssa
0
votes
1
answer
In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
1
answer
Which of the following is a digital signature algorithm?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
Asymmetric Key Encryption/Decryption requires?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
Page:
1
2
3
next »
...