Which of the following is considered Personally Identifiable Information (PII)?
Fundamentals of Secure Software - Cryptographic Failures

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Doctor's orders
Credit card number
Driver's license
Lab results
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common cause of cryptographic failures?
Using trusted certificate chains
Using strong encryption keys
Transmitting data in clear text
Implementing HTTPS
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a defense against cryptographic failures?
Ignoring access controls
Using plain encryption
Collecting unnecessary data
Protecting data at rest
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using authenticated encryption?
To ensure data is transmitted in clear text
To use outdated encryption algorithms
To verify the identity of communicating parties
To allow unauthorized access to data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a recommended practice to prevent memory leaks?
Ignoring code quality
Allowing insecure direct object references
Setting compiler settings in the IDE
Using weak encryption keys
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential risk if a website does not enforce TLS?
Enhanced user privacy
Improved data security
Increased encryption strength
Network traffic monitoring by attackers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can attackers do if they intercept network traffic on a non-TLS page?
Enhance encryption
Steal user sessions
Improve website performance
Secure the connection
Similar Resources on Quizizz
6 questions
SSL Interception with Fake Access Point

Interactive video
•
University
6 questions
AWS Certified Data Analytics Specialty 2021 - Hands-On! - Encryption 101

Interactive video
•
University
6 questions
AWS Certified Data Analytics Specialty 2021 – Hands-On - Encryption 101

Interactive video
•
University
6 questions
A Detailed Guide to the OWASP Top 10 - #2 Cryptographic Failures

Interactive video
•
University
2 questions
Fundamentals of Secure Software - Cryptographic Failures

Interactive video
•
University
3 questions
A Detailed Guide to the OWASP Top 10 - #2 Cryptographic Failures

Interactive video
•
University
6 questions
SSL Complete Guide 2021: HTTP to HTTPS - Introduction to SSL and TLS

Interactive video
•
University
2 questions
CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2

Interactive video
•
University
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
Discover more resources for Information Technology (IT)
10 questions
Identifying equations

Quiz
•
KG - University
16 questions
Chapter 8 - Getting Along with your Supervisor

Quiz
•
3rd Grade - Professio...
6 questions
Railroad Operations and Classifications Quiz

Quiz
•
University
71 questions
Logos

Quiz
•
3rd Grade - University
8 questions
Mali - Geography

Quiz
•
University