Web Programming

FREE Security Web Programming Question and Answers

0%

Which of the following would satisfy the multifactor authentication requirements?

Correct! Wrong!

Which THREE (3) threats are based on email? spam and assaults using attachments Email address forgery (iii) and insufficient user authentication (iv)

Correct! Wrong!

Determine the cause of the difficulty in monitoring security caused by HTTPS traffic.

Correct! Wrong!

Select the TCP port that SSL/TLS for HTTPS communication uses.

Correct! Wrong!

Select the statement about system vulnerabilities that is TRUE from the following. i. A system threat is a vulnerability. ii. An exploitable flaw in a system's design is referred to as a vulnerability. iii. Protocols, operating systems, applications, hardware, and system design all have vulnerabilities. iv. Exploits known as vulnerabilities are found in software and hardware products every day.

Correct! Wrong!

Which hashing algorithm among the following is the LEAST secure?

Correct! Wrong!

Recent data loss occurred on a web server that was set up to use TLS with AES-GCM-256, SHA-384, and ECDSA. Select the factor that is MOST likely to be the cause.

Correct! Wrong!