Which of the following mechanisms is MOST commonly used when attempting a privileged operation?
Which of the following mechanisms is MOST commonly used when attempting a privileged
operation?
What level of security is provided by placing sensitive methods and data inside its own Java package?
What level of security is provided by placing sensitive methods and data inside its own Java
package?
which of the following before returning control flow to the application?
When handling sensitive data inside an exception block, it is BEST to do which of the following
before returning control flow to the application?
which of the following is the BEST approach?
As a general best practice when logging application data which of the following is the BEST
approach?
Which of the following sensitive data items must be protected in transit at all times?
Which of the following sensitive data items must be protected in transit at all times?
Which of the following attempts to prevent Javascript from accessing a session cookie in a mobile browser?
Which of the following attempts to prevent Javascript from accessing a session cookie in a mobile
browser?
Why is it important to security to follow defined naming conventions when coding?
Why is it important to security to follow defined naming conventions when coding?
which of the following attacks on a developer’s code?
Failing to declare a class final can enable which of the following attacks on a developer’s code?
what attacks does that expose?
If a Java package contains sensitive data in one or more classes, and the data is declared public,
what attacks does that expose?
Which of the following describes why a developer should define private wrappers around native and public nativ
Which of the following describes why a developer should define private wrappers around native
and public native methods?