FREE Security Web Programming Question and Answers

0%

Which THREE (3) threats are based on email? spam and assaults using attachments Email address forgery (iii) and insufficient user authentication (iv)

Correct! Wrong!

Which of the following would satisfy the multifactor authentication requirements?

Correct! Wrong!

Select the statement about system vulnerabilities that is TRUE from the following. i. A system threat is a vulnerability. ii. An exploitable flaw in a system's design is referred to as a vulnerability. iii. Protocols, operating systems, applications, hardware, and system design all have vulnerabilities. iv. Exploits known as vulnerabilities are found in software and hardware products every day.

Correct! Wrong!

Determine the cause of the difficulty in monitoring security caused by HTTPS traffic.

Correct! Wrong!

Recent data loss occurred on a web server that was set up to use TLS with AES-GCM-256, SHA-384, and ECDSA. Select the factor that is MOST likely to be the cause.

Correct! Wrong!

Which hashing algorithm among the following is the LEAST secure?

Correct! Wrong!

Select the TCP port that SSL/TLS for HTTPS communication uses.

Correct! Wrong!

Premium Tests $49/mo
FREE November-2024