Which of the following is considered Personally Identifiable Information (PII)?
Fundamentals of Secure Software - Cryptographic Failures

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Doctor's orders
Credit card number
Driver's license
Lab results
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common cause of cryptographic failures?
Using trusted certificate chains
Using strong encryption keys
Transmitting data in clear text
Implementing HTTPS
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a defense against cryptographic failures?
Ignoring access controls
Using plain encryption
Collecting unnecessary data
Protecting data at rest
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using authenticated encryption?
To ensure data is transmitted in clear text
To use outdated encryption algorithms
To verify the identity of communicating parties
To allow unauthorized access to data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a recommended practice to prevent memory leaks?
Ignoring code quality
Allowing insecure direct object references
Setting compiler settings in the IDE
Using weak encryption keys
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential risk if a website does not enforce TLS?
Enhanced user privacy
Improved data security
Increased encryption strength
Network traffic monitoring by attackers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can attackers do if they intercept network traffic on a non-TLS page?
Enhance encryption
Steal user sessions
Improve website performance
Secure the connection
Similar Resources on Quizizz
6 questions
SSL Interception with Fake Access Point

Interactive video
•
University
6 questions
AWS Certified Data Analytics Specialty 2021 - Hands-On! - Encryption 101

Interactive video
•
University
6 questions
SSL Complete Guide 2021: HTTP to HTTPS - Section Introduction - Introduction to HTTPS and TLS

Interactive video
•
University
6 questions
HashiCorp Certified - Vault Associate Course - Vault Architecture and Pathing Structure

Interactive video
•
University
3 questions
SSL Complete Guide 2021: HTTP to HTTPS - Why RSA is not Used for Data Encryption in HTTPS

Interactive video
•
University
8 questions
Fundamentals of Secure Software - Cryptographic Failures

Interactive video
•
University
6 questions
SSL Complete Guide 2021: HTTP to HTTPS - Introduction to SSL and TLS

Interactive video
•
University
8 questions
CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2

Interactive video
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade