Cyber Security Essentials UK 3

Cyber Security Essentials UK 3

University

10 Qs

quiz-placeholder

Similar activities

Module 9 (Fundamentals of Cybersecurity)

Module 9 (Fundamentals of Cybersecurity)

University

10 Qs

Q8 - Ent. Sys

Q8 - Ent. Sys

University

10 Qs

Sec+ Book Questions Ch. 2 1/2

Sec+ Book Questions Ch. 2 1/2

University

10 Qs

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

Chapter 3 : Computer Software Quiz

Chapter 3 : Computer Software Quiz

University

10 Qs

Firewalls & VPN

Firewalls & VPN

University

8 Qs

Cloud Computing

Cloud Computing

University

11 Qs

Computer and Programming Fundamentals Test 1

Computer and Programming Fundamentals Test 1

University

10 Qs

Cyber Security Essentials UK 3

Cyber Security Essentials UK 3

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

OWASP stands for

Open Web Application Security Project

Open World Application Security Project

Open Web Application Security Principles

Open Web Association Security Project

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The No 1 in the Web Application Security OWASP Top Ten for 2021 is

Broken access control 

Injection

Broken Object Level Authorization

Cryptographic Failure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

................................................................. are applications built in a microservices architecture using technologies like virtual machines, containers, and serverless platforms

Web Native Applications

Cloud native applications

Application Program Interfaces

Mobile Applications

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is No: 1 in the OSWAP Top Ten Mobile Application
Vulnerability

Improper Platform Usage

Improper Credential Usage

Insecure data storage

Inadequate supply chain security

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

'Security Patch Updates' can be done in which phase of the Secure SDLC?

Design

Development

Deployment

Maintenance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................................................................ is a list of cybersecurity vulnerabilities and exposures found in a specific software product. The list is linked to information from several different vulnerability databases, which allows users to more easily compare security tools and services.

Common Weakness Enumeration 

Common Vulnerabilities and Exposures

CERT Coding Standards 

OWASP Top 10

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a Secure Coding Practices?

Validate Input

Heed Compiler Warning

Sanitise Data Sent to other systems

Use Effective Quality Assurance Technique

Choice a Good Programming Language

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?