Login
Remember
Register
User sharadyadav1986
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by sharadyadav1986
0
votes
In JavaScript, the definition of a function starts with____
answered
Mar 23, 2021
in
JavaScript
javascipt
definition
function
0
votes
What happens if the return statement has no related expression?
answered
Mar 23, 2021
in
JavaScript
expression
javascript
keyword
0
votes
Which one of the following options is the correct output for the given code of JavaScript?
answered
Mar 23, 2021
in
JavaScript
javascript
code-output
0
votes
Which one of the following code is equivalent to call a function "x" of the class "a" which have two arguments g and h?
answered
Mar 23, 2021
in
JavaScript
javascript
out-put-code
0
votes
Which one of the following code is equivalent to the following given code?
answered
Mar 23, 2021
in
JavaScript
javascript
code
program
0
votes
Which one of the following options is the correct output for the given code of JavaScript?
answered
Mar 23, 2021
in
JavaScript
javascript
code-output
0
votes
Which one of the following options is the correct output for the given code of JavaScript?
answered
Mar 23, 2021
in
JavaScript
javascript
code-output
0
votes
Which one of the following options is the correct output for the given code of JavaScript?
answered
Mar 23, 2021
in
JavaScript
javascript
output
code
0
votes
Which one of the following options is the correct output for the given code of JavaScript?
answered
Mar 23, 2021
in
JavaScript
javascript
output
code
0
votes
Which one of the following options is the correct output for the given code of JavaScript?
answered
Mar 23, 2021
in
JavaScript
javascript
output
code
program
0
votes
Which one of the following keywords is used for defining the function in the JavaScript?
answered
Mar 23, 2021
in
JavaScript
javascript
funciton
code
0
votes
Select the Correct statement.
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling
ssa
authorization
0
votes
The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
answered
Mar 18, 2021
in
Threat Modeling
#validations
threat-modeling
ssa
ascii-range
0
votes
CAPTCHA is used as remediation for which of the following attacks?
answered
Mar 18, 2021
in
Threat Modeling
captcha-authentication
remediation
security-attacks
0
votes
What are the popular threat modeling techniques? A) Entry point identification b) Privilege boundaries c) Threat trees d) Flooding
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling-techniques
threat-modeling
threat-trees
0
votes
Identify Correct statement:
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling
ssa
sql-injection-attack
0
votes
State True or False: Maintenance (Operational) Security is not required if software is developed securely.
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling
secure-software
security
0
votes
What is Single Sign-Off?
answered
Mar 18, 2021
in
Threat Modeling
#single-sign-off
sso
sso-authentication
0
votes
Security code review should be done throughout the SDLC.
answered
Mar 18, 2021
in
Threat Modeling
#security-code
sdlc-security-code-review
ssa
0
votes
Which of the following is correct description for “Accountability” attribute?
answered
Mar 18, 2021
in
Threat Modeling
authorization
accountability
security-accountability
Page:
« prev
1
...
261
262
263
264
265
266
267
268
269
270
271
...
330
next »
...