Security
Secure Coding Practices
Enter your Username
Please enter your username(email) before you take the quiz.
Secure Coding Practices
Questions 1 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
Sanitize all output of untrusted data to operating system commands
Questions 2 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
Require authentication for all pages and resources, except those specifically intended to be public.
Questions 3 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
A set of controls that verify the properties of all input data matches what is expected by the application including types, lengths, ranges, acceptable character sets and does not include known hazardous characters.
Questions 4 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
A set of controls used to verify the identity of a user or other entity interacting with the software.
Questions 5 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
Which of the following cannot be accepted as a guideline to writing secure codes?
Questions 6 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
If any potentially hazardous characters must be allowed as input, be sure that you implement additional controls like output encoding, secure task specific APIs, and accounting for the utilization of that data throughout the application.
Questions 7 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
Do not limit the type of files that can be uploaded to only those types that are needed for business purposes
Questions 8 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
All validation failures should result in input rejection
Questions 9 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
It is good practice to enforce account disabling after an established number of invalid login attempts
Questions 10 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
Authentication failure responses should indicate which part of the authentication data was incorrect.
Questions 11 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
Enforcing password complexity is not required in registration module
Questions 12 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
To take advantage of a vulnerability. Typically this is an intentional act designed to compromise the software's security controls by leveraging a vulnerability.
Questions 13 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
A set of controls that grant or deny a user, or other entity, access to a system resource. This is usually based on hierarchical roles and individual privileges within a role but also includes system-to-system interactions.
Questions 14 of 15
-
Timer
0
-
Score
0
Secure Coding Practices
It is a good practice to store passwords in plaintext
Questions 15 of 15
-
Timer
0
-
Score
0
Secure Coding Practices