Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following type of metrics do not involve subjective context but are material facts?

Answer»

Which of the following type of metrics do not involve SUBJECTIVE context but are material facts?
Choose the correct option from below LIST
(1)ABSOLUTE Metrics
(2)RELATIVE Metrics

Answer:-(1)Absolute Metrics

2.

The information gathered should be organized into a _________ that can be used to prioritize the review.

Answer»

The information gathered should be organized into a _________ that can be used to prioritize the review.
Choose the correct option from below list
(1)Design DOCUMENT
(2)Threat MODEL
(3)SRS document
(4)Test report

Answer:-(2)Threat Model

3.

The estimation of software size by measuring functionality.

Answer»

The ESTIMATION of software SIZE by measuring functionality.
Choose the correct option from below list
(1)Lines of code
(2)CYCLOMATIC complexity
(3)Function POINTS
(4)Path complexity

Answer:-(3)Function Points

4.

The first step in analyzing the attack surface is ________.

Answer»

The first step in analyzing the ATTACK surface is ________.
Choose the correct OPTION from below list
(1)Understanding the context
(2)Information gathering
(3)Creating a threat model
(4)IDENTIFYING all input to the code

Answer:-(4)Identifying all input to the code

5.

The account used to make the database connection must have______ privilege.

Answer»

The account USED to make the DATABASE CONNECTION MUST have______ privilege.
Choose the CORRECT option from below list
(1)Admin
(2)Least
(3)Highest

Answer:-(2)Least

6.

Inviting a friend to help look for a hard to find vulnerability is a method of security code review.

Answer»

Inviting a FRIEND to help look for a hard to FIND VULNERABILITY is a method of SECURITY code review.
Choose the correct option from below list
(1)True
(2)False

Answer:-(1)True

7.

A solution to enhance security of passwords stored as hashes.

Answer»

A solution to enhance security of PASSWORDS stored as hashes.
Choose the correct option from below LIST
(1)ENCRYPTION
(2)USING digital signatures
(3)Salting
(4)Noncing

Answer:-(3)Salting

8.

A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of wh

Answer»

A representation of an ATTRIBUTE that cannot be measured directly, and are subjective and dependent on the CONTEXT of where the metric was derived.
Choose the CORRECT OPTION from below list
(1)Relative Metrics
(2)ABSOLUTE Metrics

Answer:-(1)Relative Metrics

9.

Authorization that restricts the functionality of a subset of users.

Answer» AUTHORIZATION that restricts the FUNCTIONALITY of a subset of users.
Choose the correct option from below list
(1)Vertical Authorization
(2)HORIZONTAL Authorization

Answer:-(1)Vertical Authorization
10.

Which of the following is more resistant to SQL injection attacks?

Answer»

Which of the following is more resistant to SQL INJECTION attacks?
Choose the correct option from below list
(1)DYNAMIC SQL statements
(2)PARAMETERIZED QUERIES

Answer:-(2)Parameterized queries

11.

The average occurrance of programming faults per Lines of Code

Answer»

The average occurrance of programming faults per Lines of CODE

(LOC) is KNOWN as _______.
Choose the correct OPTION from below list
(1)Complexity density
(2)Error density
(3)Risk Density
(4)Defect Density

Answer:-(4)Defect Density

12.

___________ can be exploited to completely ignore authorization constraints.

Answer»

___________ can be exploited to completely ignore AUTHORIZATION constraints.
Choose the correct OPTION from below list
(1)Cross SITE Scripting
(2)RACE conditions
(3)OS command injection
(4)SQL Injection

Answer:-(3)OS command injection

13.

The process by which different equivalent forms of a name can be resolved to a single standard name,

Answer»

The process by which different equivalent FORMS of a name can be resolved to a single standard name,
CHOOSE the CORRECT option from below list
(1)Canonicalization
(2)ALIASING
(3)Name resolution
(4)Input resolution

Answer:-(1)Canonicalization

14.

Which of the following are threats of cross site scripting on the authentication page?

Answer»

Which of the following are threats of cross site SCRIPTING on the authentication page?
Choose the correct option from below list
(1)Session hijacking attacks
(2)PHISHING
(3)All of these
(4)Identity theft

Answer:-(3)All of these

15.

It is easy to distinguish good code from insecure code.

Answer»

It is easy to DISTINGUISH good code from INSECURE code.
Choose the CORRECT option from below list
(1)FALSE
(2)True

Answer:-(1)False

16.

Defect density alone can be used to judge the security of code accurately.

Answer» DEFECT DENSITY alone can be used to JUDGE the security of code accurately.
Choose the CORRECT option from below LIST
(1)False
(2)True

Answer:-(1)False
17.

The process through which the identity of an entity is established to be genuine.

Answer»

The process through which the identity of an ENTITY is ESTABLISHED to be genuine.
Choose the correct OPTION from below list
(1)Identity MANAGEMENT
(2)Access controls
(3)Authorization
(4)Authentication

Answer:-(4)Authentication

18.

The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the applicat

Answer»

The approach to input validation that simply encodes CHARACTERS CONSIDERED "bad" to a format which should not AFFECT the functionality of the APPLICATION and hence is very weak
Choose the correct option from below list
(1)Encrypt bad
(2)Backlisting
(3)Encode bad

Answer:-(3)Encode bad

19.

Which of the following is an efficient way to securely store passwords?

Answer»

Which of the following is an efficient way to securely store passwords?
Choose the CORRECT option from below LIST
(1)ABSTRACTION
(2)Hashing
(3)Encryption

Answer:-(2)Hashing

20.

Parameterized stored procedures are compiled after the user input is added.

Answer»

Parameterized stored procedures are compiled after the USER INPUT is added.
Choose the correct option from below list
(1)True
(2)FALSE

Answer:-(2)False

21.

Complexity increases with the decision count.

Answer»

Complexity increases with the decision count.
Choose the correct OPTION from below LIST
(1)False
(2)TRUE

Answer:-(2)True

22.

________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a

Answer»

________ can be used to establish risk and stability estimations on an ITEM of code, such as a CLASS or method or even a COMPLETE system.
Choose the CORRECT OPTION from below list
(1)Lines of code
(2)Defect density
(3)Risk density
(4)Cyclomatic complextiy

Answer:-(4)Cyclomatic complextiy

23.

To build SQL statements it is more secure to user PreparedStatement than Statement.

Answer»

To build SQL statements it is more SECURE to USER PreparedStatement than Statement.
Choose the CORRECT option from below list
(1)True
(2)False

Answer:-(1)True

24.

It is easy to develop secure sessions with sufficient entropy.

Answer»

It is EASY to develop secure SESSIONS with sufficient entropy.
Choose the correct option from below list
(1)FALSE
(2)True

Answer:-(1)False

25.

Which of the following can be used to prevent end users from entering malicious scripts?

Answer»

Which of the following can be used to prevent end users from entering malicious scripts?
Choose the correct option from below LIST
(1)Input validation
(2)Server SIDE ENCODING
(3)Authentication
(4)Dynamic encoding

Answer:-(1)Input validation

26.

In a multi user multi threaded environment, thread safety is important as one may erroneously gain access to another ind

Answer»

In a multi user multi-threaded environment, thread safety is IMPORTANT as one MAY erroneously gain access to another individuals session by EXPLOITING ___________ .
Choose the correct option from below list
(1)OS COMMANDS
(2)Race conditions
(3)Session Integrity

Answer:-(2)Race conditions

27.

The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.

Answer»

The _______ approach to validation only PERMITS characters/ASCII ranges DEFINED within a white-LIST.
Choose the CORRECT option from below list
(1)ENCODE good
(2)Known bad
(3)Known good

Answer:-(3)Known good

28.

__________ attempts to quantify the size of the code.

Answer»

__________ attempts to quantify the SIZE of the CODE.
Choose the correct option from below list
(1)Lines of Code
(2)PATH complexity
(3)Cyclomatic complexity

Answer:-(1)Lines of Code