1.
Which industry framework is often used to guide secure software development practices?
2.
What action should be taken if a buffer overflow vulnerability is identified in the software?
3.
During a code review, you discover that developers have not applied any input validation to form data. What should you recommend?
4.
Input validation helps prevent security vulnerabilities such as SQL injection and Cross-Site Scripting (XSS).
5.
Why is reporting security incidents crucial for an organization?
6.
Scenario-based: You are designing a system that processes personal and financial information. Which practice is crucial to ensure data security?
7.
What does the principle of Least Privilege entail?
8.
Which of the following is NOT considered a best practice in secure software development? phishing attack uses email as the primary method of deception?
9.
Threat modelling is a process that involves:
10.
Which component of the C.I.A. triad is primarily concerned with ensuring data is accurate and untampered?
11.
Hardcoding sensitive information like passwords and keys in source code is a secure practice.
12.
The Secure Development Lifecycle (SDL) involves steps taken only after software deployment.
13.
In an organization, a security incident was reported involving unauthorized data access. What should be the first step according to industry frameworks?
14.
How often should regular patching and updates be performed to maintain security?
15.
What is Information Security?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!