Quiz Summary
0 of 8 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 8 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 8
1. Question
What type of attack against HTTPS attempts to make the server use weak ciphers?
CorrectIncorrect -
Question 2 of 8
2. Question
In S/MIME, which key is primarily used to protect the confidentiality of a message?
CorrectIncorrect -
Question 3 of 8
3. Question
Which protocol should replace Telnet for secure remote access?
CorrectIncorrect -
Question 4 of 8
4. Question
True or False: DNSSEC relies on a chain of trust from root servers down through the DNS hierarchy.
CorrectIncorrect -
Question 5 of 8
5. Question
Which programming practice helps prevent injection attacks like SQL injection from user input?
CorrectIncorrect -
Question 6 of 8
6. Question
Which HTTP response header helps protect against SSL stripping attacks?
CorrectIncorrect -
Question 7 of 8
7. Question
What type of information could default error messages reveal to an attacker?
CorrectIncorrect -
Question 8 of 8
8. Question
How does static code analysis improve secure software development?
CorrectIncorrect