Q1. In which phase of secure development lifecycle the threat modeling is performed?
A.Coding phase
B. Testing phase
C. Deployment phase
D. Design phase
Correct Answer: D
Q2. Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?
A.ex.StackTrace.getError();
B. ex.message();
C. ex.getMessage();
D. ex.getError();
Correct Answer: C
Q3. In which phase of secure development lifecycle the threat modeling is performed?
A.Coding phase
B. Testing phase
C. Deployment phase
D. Design phase
Correct Answer: D
Q4. Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?
A.ex.StackTrace.getError();
B. ex.message();
C. ex.getMessage();
D. ex.getError();
Correct Answer: C
$ 39
Reviews
There are no reviews yet.