FREE Security Web Programming Question and Answers

0%

Which of the following would satisfy the multifactor authentication requirements?

Correct! Wrong!

Select the TCP port that SSL/TLS for HTTPS communication uses.

Correct! Wrong!

Which THREE (3) threats are based on email? spam and assaults using attachments Email address forgery (iii) and insufficient user authentication (iv)

Correct! Wrong!

Select the statement about system vulnerabilities that is TRUE from the following. i. A system threat is a vulnerability. ii. An exploitable flaw in a system's design is referred to as a vulnerability. iii. Protocols, operating systems, applications, hardware, and system design all have vulnerabilities. iv. Exploits known as vulnerabilities are found in software and hardware products every day.

Correct! Wrong!

Recent data loss occurred on a web server that was set up to use TLS with AES-GCM-256, SHA-384, and ECDSA. Select the factor that is MOST likely to be the cause.

Correct! Wrong!

Determine the cause of the difficulty in monitoring security caused by HTTPS traffic.

Correct! Wrong!

Which hashing algorithm among the following is the LEAST secure?

Correct! Wrong!

Premium Tests $49/mo
FREE May-2024