Search Header Logo

Topic A01 Fundamentals of Secure Coding

Authored by Jigme Dema

Instructional Technology

University

Used 4+ times

Topic A01 Fundamentals of Secure Coding
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User input is directly inserted into SQL queries. How can this be prevented?

Hide SQL errors from the user only

Require all input to be uppercase

Replace spaces with underscores in input

Use parameterized queries or prepared statements

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Messaging app built without threat modeling; some endpoints lack authorization checks. Why is this insecure design?

It's caused by outdated frameworks

Only junior developers worked on it

Security wasn't considered during architecture

The app doesn’t use a dark mode

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Libraries are outdated, one has an RCE vulnerability. What is the best approach?

Ignore until next major project upgrade

Update vulnerable components, test, and deploy

Add more antivirus software to the server

Remove all third-party libraries

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unlimited login attempts; tokens never expire. Which fix is most secure?

Implement rate limiting, lockout policies, and short-lived tokens

Force all users to log in daily

Use the same password for all accounts

Keep current design for convenience

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Logs are overwritten daily, no alerts for suspicious patterns. What’s the best security improvement?

Save logs in a spreadsheet once a week

Only log successful logins

Store logs long-term, enable real-time alerts, and review regularly

Remove logging entirely to save space

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In security terms, what is a 'threat'?

A known software bug

A coding style violation

A harmless system alert

A potential event that can exploit a vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrating security into every SDLC phase achieve?

Reduces the need for testing

Ensures no design changes are made

Detects and prevents security issues early

Removes all bugs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?