App Security Recap

App Security Recap

11th Grade

19 Qs

quiz-placeholder

Similar activities

POCS-Ch. 3.1 & 3.2 (Vocab)

POCS-Ch. 3.1 & 3.2 (Vocab)

7th - 12th Grade

20 Qs

Linux - Unit 8 Quiz

Linux - Unit 8 Quiz

9th - 12th Grade

20 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

iGCSE Computer Science: Software

iGCSE Computer Science: Software

9th - 12th Grade

20 Qs

Protocols Quiz

Protocols Quiz

11th Grade

17 Qs

Attacks Threats & Vulnerabilities (C1)

Attacks Threats & Vulnerabilities (C1)

9th - 12th Grade

15 Qs

Cybersecurity & Intellectual Property Review

Cybersecurity & Intellectual Property Review

9th - 12th Grade

17 Qs

General ICT Questions (Part 1)

General ICT Questions (Part 1)

5th - 12th Grade

20 Qs

App Security Recap

App Security Recap

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Zh L

Used 2+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which package is used to hash passwords and other sensitive information before sending them to the database to protect against breaches?

jsonwebtoken

dotenv

bcrypt

mongoose

Answer explanation

bcrypt is used to hash passwords and sensitive data before storing them in a database.

It provides security by converting passwords into irreversible strings, protecting against breaches by ensuring that even if the database is compromised, the original passwords remain unknown.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Access Tokens?

To allow a new access to be requested

To grant access based on the user's role

To authenticate a user

To track who does what, when, where and how

Answer explanation

Access tokens are used to grant access to specific resources or functionalities based on the user's role or permissions, ensuring that users only have access to what they are authorized to use.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the jsonwebtoken package in app security?

To manage environmental variables and sensitive information.

To provide a means of representing claims transferred between two parties securely.

To hash passwords and sensitive information.

To build APIs and server-side applications with Node.js.

Answer explanation

JWT enables the creation, verification, and decoding of JSON Web Tokens (JWTs), which are used to authenticate and authorize users in web applications.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the value of access control?

To grant access based on the user's role

To provide case-by-case control over resources

To regulate access rights and organize them into tiers

To keep sensitive information from falling into the hands of bad actors

5.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

What does Authentication help in achieving?

To report on what was done

To track who does what, when, where and how

To be able to prove who we are

To get permission to do something

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Identity Concept?

To get permission to do something

To track who does what, when, where and how

To be able to prove what we are

To report on what was done

Answer explanation

The purpose of the Identity Concept is to track who does what, when, where, and how, primarily focusing on managing and securing digital identities within an organization or across digital platforms.

7.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

How are authorizations handled?

By managing policy control

By granting access to resources and defining actions

By tracking who does what, when, where and how

By simplifying enforcement through a common approach

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?