• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Mock exam in ch 2 in Charles' book

 
Bartender
Posts: 2418
13
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
In Ch2 of Charles' book:


Which of the following present considerable security risk?
A. Get
B. Post
C.Put
D.Trace
E.Delete

The answer is C, E
Explanation:
Both PUT and DELETE provide a way to change the file configuration on the server. Unauthorized user may lead to the uploading of malicious code or viruses.



For this question, I don't think any of the action present any security risk because we can set a security constraint, which does not allow unauthorized users.
 
Creator of Enthuware JWS+ V6
Posts: 3411
320
Android Eclipse IDE Chrome
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
PUT and DELETE do present a security risk! Note that there is nothing written about security constraints in the question.
 
reply
    Bookmark Topic Watch Topic
  • New Topic