Secure Programming Practices
Secure Programming Practices
me/fresco_milestone ( @fresco_milestone )
Which of the following statement is not true regarding Error Handling and Logging?
Which of the following is not an appropriate method to make an authentication mechanism secure?
When valuable information has to be transmitted as part of a client request, which of the following
mode should be used?
Which of the following methods can be used by the client and server to validate user input?
Answer : E) A) and B)
Which of the following is not recommended to secure web applications against authenticated users?
There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent
to the web server in clear text, in which of the following authentication scheme?
Answer: Basic
Answer: Cookie-based
To improve the overall quality of web applications, developers should abide by which of the
following rules?
Setting the cookie flag to which of the following mode is a good programming practice?
Answer : Secure
Answer : E) A) and C)
Which of the following is a best practice for Audit Trail and Logging?
Answer : Restrict the access level of configuration and program-level resources. & All the above
options(incorrect)
Which of the following is a security advantage of managed code over unmanaged code?
Set2:
Answer : Unclear security requirements and inadequate security reviews are the primary reasons for
security issues. (Incorrect)
Answer : ALl
Answer : A, B & C
Which of the following is the best approach to use when providing access to an SSO application in a
portal?
Authentication and session management are security concerns of which of the following
programming languages?
Answer : All
From application security perspective, why should a CAPTCHA be used in a web application?
In a multi-staged login mechanism, which of the following regarding application security should be
ensured by the developer?
Answer : The application should validate the credentials supplied at each stage and the previous
stages.
Development teams need not worry about rework due to security vulnerability.
High vulnerability can be ignored, and software can be released to the customer.
Which of the following statement is not true regarding Error Handling and Logging?
Answer : E) A and B