Login
Remember
Register
Ask a Question
Recent questions tagged ssa
0
votes
1
answer
DES & 3DES are?
asked
Mar 17, 2021
in
SAP
by
DavidAnderson
ssa
0
votes
1
answer
What are the basic security requirement of a typical SSO solution?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
in the context of "authentication ",which of the following is correct description of a user's "identity" or "identifier"?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
The use of proper security techniques can :
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
2
answers
Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
secure-programming
0
votes
1
answer
Process Flow Diagrams are used by ___________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
process-flow-diagrams
pfd
threat-modeling
ssa
+1
vote
1
answer
Block Cipher is example of
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
1
answer
Symmetric Key Encryption/Decryption requires
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
Identity theft is an example of __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-example
threat-modeling
ssa
0
votes
1
answer
Impact of Injection attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
1
answer
Security Requirement Analysis ensures what from the following?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
Multifactor authentication can be used to handle _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
multifactor-authentication
authentication
application-authentication
ssa
0
votes
1
answer
Which of the following are the types of vulnerabilities that hackers look out for in application to target them for attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
1
answer
The output of the threat modeling process is a _________ which details out the threats and mitigation steps.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-process
threat-mitigation
threat-process
ssa
0
votes
1
answer
Which of the following is a security advantage of managed code cover over unmanaged code?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
manage-code
0
votes
1
answer
Which of the following are approaches for input validation?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
1
answer
An action that harms an asset is ________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
asset-harm
harm-action
action-harm
ssa
threat-modeling
0
votes
1
answer
Passwords should not be logged
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
1
answer
Operational Threat Models in VAST covers following
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
ssa
Page:
« prev
1
2
3
next »
...