Login
Remember
Register
User DavidAnderson
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by DavidAnderson
0
votes
What threat arises from not flagging HTTP cookies with tokens, as secure?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
What attack can be prevented by links or forms that invoke state-changing functions with an unpredictable token for each user?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Which of the following actions should you take to verify the implementation of a web application?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Which of the following are the best ways to implement transport layer protection?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
In which of the following scenarios should you use the escaping technique?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
What happens when an application takes user inputted data, and sends it to a web browser without proper validation and escaping?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Which of the following depict the typical impact of failure to restrict URL access?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
What is the attack technique used to exploit websites by altering the backend database queries through inputting manipulated queries?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
What flaw arises from session tokens having poor randomness across a range of values?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Which of the following consequences are most likely to occur due to an injection attack?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Which of the following are the best ways to protect against injection attacks?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
What type of flaw occurs when untrusted user-entered data is sent to the interpreter as part of a query or command?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
How to retrieve an element with getElementById and then extend it to use Prototype methods?
answered
Feb 1, 2022
in
Other
interview-question-answer
0
votes
PHP - How can I dynamically export data to excel file (.xls)?
answered
Feb 1, 2022
in
Other
interview-question-answer
0
votes
Project Target Framework Not Installed
answered
Feb 1, 2022
in
Other
interview-question-answer
0
votes
Wrong Presentation time at H264 streams [Live555 OpenRtspClient]
answered
Feb 1, 2022
in
Other
interview-question-answer
0
votes
Check content before using regex match
answered
Feb 1, 2022
in
Other
interview-question-answer
0
votes
Cross-refences with Action on Jbutton
answered
Feb 1, 2022
in
Other
interview-question-answer
0
votes
Spring Database backed authentication + Jersey client
answered
Feb 1, 2022
in
Other
interview-question-answer
0
votes
bug in php armstrong code
answered
Feb 1, 2022
in
Other
interview-question-answer
Page:
« prev
1
...
107
108
109
110
111
112
113
114
115
116
117
...
183
next »
...