CSS Quiz 8 AKTU Prutor - Scifi Curoisity
  • CSS Quiz 8 AKTU Prutor




     Q:1. Password should be combination of ____. (according to the video lecture).

    1.
    2.
    3.
    4. ->
    Reason: The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words

    Q:2.
     The cookies we use, are sent with ______, which in general, _____ the performance.
    1.
    2. ->
    3.
    4.
    Reason : typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus performance begins to degrade.

    Q:3.
     Which of the following header is used to create cookie ?
    1.
    2.
    3. ->
    4.
    Reason: After receiving an HTTP request, a server can send one or more Set-Cookie headers with the response. The cookie is usually stored by the browser, and then the cookie is sent with requests made to the same server inside a Cookie HTTP header.

    Q:4.
     _______ is an attack to inject code, in which malicious SQL code is passed to an instance of SQL Server from ______.
    1. ->
    2.
    3.
    4.
    Reason: SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker.

    Q:5.
     How to prevent SQL injection ?
    1.
    2.
    3. ->
    4.

    Reason: The best way to prevent SQL Injections is to use safe programming functions that make SQL Injections impossible: parameterized queries (prepared statements) and stored procedures. Every major programming language currently has such safe functions and every developer should only use such safe functions to work with the database.
  • You might also like

    1 comment :

    1. Css Quiz 8 Aktu Prutor
      -
      Scifi Curoisity >>>>> Download Now

      >>>>> Download Full

      Css Quiz 8 Aktu Prutor
      -
      Scifi Curoisity >>>>> Download LINK

      >>>>> Download Now

      Css Quiz 8 Aktu Prutor
      -
      Scifi Curoisity >>>>> Download Full

      >>>>> Download LINK

      ReplyDelete

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

How to integrate Git bash With Vs code

  # Integrated-VS-code-with-git-bash Let's See How to integrate git bash with vs code  > first you need to oopen setting > sarch setting.json  > then in last you have to paste like these  >      "terminal.integrated.shell.windows": "C:\\Program Files\\Git\\bin\\bash.exe"  Now you will able to use git bash terminal in vs code 

CSS Quiz 5 AKTU

  Q1) Chroot jail is used to _______ process and its children by ________ to the supplied directory name. isolate, changing the root directory ->  change, the name execute, renaming it All of the above Reason :   A  chroot jail  is a way to isolate a process and its children from the rest of the system. It should only be  used  for processes that don't run as root, as root users can break out of the  jail  very easily Q2) Taliking about FreeBSD jail, which of the following is true ? It can only bind to sockets with specified IP address and authorized ports ->  It can communicate with processes inside and outside of jail Root is limited (example: cannot load kernel modules) None of the above Reason :   The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the sam...

CSS Quiz 1 aktu

     Question 1)  What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?     4%     50%     100% ->    125% Question 2)  Identify the software whose vulnerability is exploited the most ?     Android     -> Browser      Adobe Flash Player     Microsoft Office Question 3) The computer vulnerabilities and exploits databases are maintained by _________.    Kaspersky Lab    Symantec Corporation   ->  MITRE Corporation      None of the above Question 4) Which of the following is/are correct with respect to Ransomware ?     It is a form of Malware     It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.     It locks the system's screen or locks the users' files unless a ransom is paid. ->All of the above.   Questi...

Featured