Cyber Security Essentials UK 3

Cyber Security Essentials UK 3

University

10 Qs

quiz-placeholder

Similar activities

Lesson 2 - Passing Data to Subsystems

Lesson 2 - Passing Data to Subsystems

University

10 Qs

Internet protocols

Internet protocols

University

9 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

Information Security UK 7

Information Security UK 7

University

10 Qs

Diploma in Information Technology Quiz

Diploma in Information Technology Quiz

University

8 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

barral pukingkay

barral pukingkay

University

15 Qs

ELEC 4- PROFESSIONAL ELECTIVE 4_Web Frameworks Quiz

ELEC 4- PROFESSIONAL ELECTIVE 4_Web Frameworks Quiz

University

10 Qs

Cyber Security Essentials UK 3

Cyber Security Essentials UK 3

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

OWASP stands for

Open Web Application Security Project

Open World Application Security Project

Open Web Application Security Principles

Open Web Association Security Project

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The No 1 in the Web Application Security OWASP Top Ten for 2021 is

Broken access control 

Injection

Broken Object Level Authorization

Cryptographic Failure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

................................................................. are applications built in a microservices architecture using technologies like virtual machines, containers, and serverless platforms

Web Native Applications

Cloud native applications

Application Program Interfaces

Mobile Applications

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is No: 1 in the OSWAP Top Ten Mobile Application
Vulnerability

Improper Platform Usage

Improper Credential Usage

Insecure data storage

Inadequate supply chain security

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

'Security Patch Updates' can be done in which phase of the Secure SDLC?

Design

Development

Deployment

Maintenance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................................................................ is a list of cybersecurity vulnerabilities and exposures found in a specific software product. The list is linked to information from several different vulnerability databases, which allows users to more easily compare security tools and services.

Common Weakness Enumeration 

Common Vulnerabilities and Exposures

CERT Coding Standards 

OWASP Top 10

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a Secure Coding Practices?

Validate Input

Heed Compiler Warning

Sanitise Data Sent to other systems

Use Effective Quality Assurance Technique

Choice a Good Programming Language

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?