This quiz is designed to assess the understanding of code analysis and security development life cycle.
Function coverage
Statement coverage
Decision coverage
Condition coverage
Rate this question:
Design.
Coding implementation done.
Testing.
Maintenance.
Rate this question:
Consistent name style.
Interface segregation. (接口隔离)
Dependency Inversion. (依赖反转)
Single responsibility.
Rate this question:
Cross-site scripting
Cross-site request forgery
Open redirect
Forced browsing
Rate this question:
Path traversal
Injection
Secret disclosure
Insecure deserialization
Rate this question:
C++
Java
Python
Go
Rate this question:
Cpplint
Coverity
Eclipse
None
Rate this question:
Design.
Coding implementation done.
Testing.
Maintenance.
Rate this question:
Dead code
Race conditions
Coded by humans issue
Performance bottle neck
Rate this question:
CPU sampling
Instrumentation
Memory profiling
Enhanced type checking
Rate this question:
Done
Compile error
Runtime error
None of the above
Rate this question:
Memory Safety
Dead Code Checking
Uninitialized/Unused Variables
Boundary checks
Rate this question:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Rate this question:
This vulnerability can be exploited over Intranet
This vulnerability can cause a service unavailability when exploited
This vulnerability can be exploit by privileged user only (e.g. root, admin)
Attacker need condition beyond his control to perform exploit
Rate this question:
3
30
60
90
Rate this question:
Use Long/Strong password
Lock account after number of failed attempts
Use 2nd factor (2FA) authentication
Allow not more than 5 login attempt every hour
Rate this question:
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
PRM files
OVA files
MSI installer
WAR files
Rate this question:
Cross-site scripting
Cross-site request forgery
Open redirect
Forced browsing
Rate this question:
Null pointer dereferences
Resource leaks
Control flow issues
Wrong comments
Rate this question:
15%
25%
35%
45%
Rate this question:
Coverity
Eclipse
Visual Studio
Source Insight
Rate this question:
Valgrind
Visual studio
IBM Rational
P4V
Rate this question:
Consistency naming.
Write short function.
More comments as possible as we can.
Check input parameters in public function.
Rate this question:
NtSecurity. cpp
My_useful_class. cc
Dns_look_up. h
Ascii. py
Rate this question:
Design
Build
Analysis
Respond
Rate this question:
Vulnerability Response
Security Documentation
Process Governance
Injection Protection
Rate this question:
Any SHA2
Any SHA3
SHA1
MD5
Rate this question:
Boundary checks
Memory safety checks
dead code checks
race conditions / synchronization checks
Rate this question:
3
30
60
90
Rate this question:
Security Configuration Guide (SCG)
False Positives Knowledge Base (KB)
Product Requirement Document (PRD)
Security Advisory (DSA)
Rate this question:
Qualys Scan
Nessus Scan
MacAfee Scan
Blackduck Scan
Rate this question:
1
2
5
10
Rate this question:
Run slow
False positives
Cover all bugs in code
No need compile before test.
Rate this question:
Use HTTPS Only
No Sensitive data send via GET query
Terminate session after inactivity
Use cookies securely
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Antiterrorism Awareness Training Quiz
Terrorism is one of the biggest scourges facing the world today. Play this highly informative quiz on antiterrorism awareness training to learn skills, procedures, and steps...
Questions:
10 |
Attempts:
57 |
Last updated:
Aug 16, 2023
|
CCNA Security V2.0 Final Exam
The CCNA Security v2.0 Final Exam assesses advanced knowledge in network security, focusing on control plane protection, authentication methods, and security tools like Nmap. This...
Questions:
98 |
Attempts:
326 |
Last updated:
Sep 04, 2023
|
Test Your Knowledge About Secure Remote Access, Click On Start Button
Do you know which security standards you should follow before connecting to the company network remotely?
To test your understanding of securing remote access, select the...
Questions:
5 |
Attempts:
307 |
Last updated:
Mar 20, 2023
|
True / False Exercise-Societal Impact
This quiz evaluates understanding of cybersecurity topics like malware, hacking, and ethical hacking, emphasizing their societal impacts.
Questions:
10 |
Attempts:
249 |
Last updated:
Mar 21, 2023
|
NIST Computer Saavy Test
Take this quiz to see how security saavy you are.
Questions:
7 |
Attempts:
100 |
Last updated:
Mar 23, 2023
|
Cloud Security Quiz #1001 (Sanjay Jha | ProProfs)
Cloud Security Quiz #1001 by Sanjay Jha on ProProfs assesses knowledge on cloud visibility, shadow IT, data encryption, and data localization. It's essential for understanding...
Questions:
10 |
Attempts:
70 |
Last updated:
Mar 14, 2023
|
Wait!
Here's an interesting quiz for you.