Facebook 283 Move Zeroes 47.7% Easy 325 Maximum Size Subarray Sum Equals k 41.6% Medium 301 Remove Invalid Parentheses 34.6% Hard 311 Sparse Matrix Multiplication 50.5% Medium 314 Binary Tree Vertical Order Traversal 35.3% Medium 67 Add Binary 30.4% Easy 273 Integer to English Words 21.0% Hard 17 Letter Combinations of a Phone Number 32.4% Medium 278 First Bad Version 24.3% Easy 253 Meeting Rooms II 38.2% Medium 91 Decode Ways 18.8% Medium 15 3Sum 20.9% Medium 10 Regular Expression Matching 23.5% Hard 297 Serialize and Deserialize Binary Tree 31.5% Hard 277 Find the Celebrity 35.6% Medium 158 Read N Characters Given Read4 II - Call multiple times 24.3% Hard 161 One Edit Distance 30.5% Medium 200 Number of Islands 32.2% Medium 285 Inorder Successor in BST 36.2% Medium 76 Minimum Window Substring 23.8% Hard 157 Read N Characters Given Read4 29.4% Easy 282 Expression Add Operators 28.5% Hard 23 Merge k Sorted Lists 25.9% Hard 257 Binary Tree Paths 34.7% Easy 56 Merge Intervals 28.3% Hard 211 Add and Search Word - Data structure design 20.1% Medium 121 Best Time to Buy and Sell Stock 39.1% Easy 341 Flatten Nested List Iterator 38.6% Medium 173 Binary Search Tree Iterator 38.9% Medium 1 Two Sum 29.8% Easy 139 Word Break 28.2% Medium 75 Sort Colors 36.6% Medium 78 Subsets 36.6% Medium 125 Valid Palindrome 25.3% Easy 98 Validate Binary Search Tree 22.3% Medium 206 Reverse Linked List 43.4% Easy 218 The Skyline Problem 25.5% Hard 236 Lowest Common Ancestor of a Binary Tree 29.3% Medium 133 Clone Graph 25.0% Medium 252 Meeting Rooms 45.3% Easy 49 Group Anagrams 31.8% Medium 43 Multiply Strings 25.9% Medium 79 Word Search 25.3% Medium 57 Insert Interval 26.3% Hard 38 Count and Say 32.5% Easy 238 Product of Array Except Self 47.0% Medium 209 Minimum Size Subarray Sum 28.5% Medium 377 Combination Sum IV 41.6% Medium 71 Simplify Path 24.0% Medium 215 Kth Largest Element in an Array 37.4% Medium 13 Roman to Integer 43.4% Easy 380 Insert Delete GetRandom O(1) 38.3% Hard 146 LRU Cache 16.0% Hard 90 Subsets II 33.8% Medium 208 Implement Trie (Prefix Tree) 25.6% Medium 128 Longest Consecutive Sequence 35.3% Hard 44 Wildcard Matching 19.0% Hard 334 Increasing Triplet Subsequence 37.8% Medium 398 Random Pick Index 39.8% Medium 28 Implement strStr() 26.9% Easy 33 Search in Rotated Sorted Array 31.9% Hard 88 Merge Sorted Array 31.4% Easy 102 Binary Tree Level Order Traversal 36.9% Easy 127 Word Ladder 19.3% Medium 50 Pow(x, n) 27.1% Medium 286 Walls and Gates 42.3% Medium 69 Sqrt(x) 26.9% Medium 20 Valid Parentheses 32.1% Easy 235 Lowest Common Ancestor of a Binary Search Tree 38.1% Easy 269 Alien Dictionary 22.4% Hard 117 Populating Next Right Pointers in Each Node II 33.5% Hard 68 Text Justification 18.1% Hard 221 Maximal Square 27.0% Medium 274 H-Index 32.0% Medium 210 Course Schedule II 25.6% Medium 85 Maximal Rectangle 26.0% Hard 234 Palindrome Linked List 31.6% Easy 25 Reverse Nodes in k-Group 29.7% Hard 265 Paint House II 37.1% Hard 26 Remove Duplicates from Sorted Array 35.3% Easy 275 H-Index II 33.5% Medium 80 Remove Duplicates from Sorted Array II 34.9% Medium 461 Hamming Distance 73.0% Easy 168 Excel Sheet Column Title 24.4% Easy 404 Sum of Left Leaves 45.7% Easy 261 Graph Valid Tree 36.5% Medium 410 Split Array Largest Sum 32.0% Hard 477 Total Hamming Distance 44.8% Medium |
Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream. Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...
Comments
Post a Comment
https://gengwg.blogspot.com/