1.
Which component of the C.I.A. triad is primarily concerned with ensuring data is accurate and untampered?
2.
Which of the following is NOT considered a best practice in secure software development? phishing attack uses email as the primary method of deception?
3.
Scenario-based: You are designing a system that processes personal and financial information. Which practice is crucial to ensure data security?
4.
What is Information Security?
5.
Which industry framework is often used to guide secure software development practices?
6.
During a code review, you discover that developers have not applied any input validation to form data. What should you recommend?
7.
In an organization, a security incident was reported involving unauthorized data access. What should be the first step according to industry frameworks?
8.
Why is it important to secure file uploads in a web application?
9.
The Secure Development Lifecycle (SDL) involves steps taken only after software deployment.
10.
Input validation helps prevent security vulnerabilities such as SQL injection and Cross-Site Scripting (XSS).
11.
Threat modelling is a process that involves:
12.
What does the principle of Least Privilege entail?
13.
Which practice is essential to mitigate risks related to API security?
14.
Hardcoding sensitive information like passwords and keys in source code is a secure practice.
15.
Why is reporting security incidents crucial for an organization?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!