Secure Development Practices
Rating
0
0
There are no comments for now.
Join this Course
to be the first to leave a comment.
1.
Why should applications validate user input?
2.
A developer stores production API credentials directly inside a public repository “temporarily”. Why is this dangerous?
3.
Which statement BEST describes least privilege in application development?
4.
Which of the following is an example of poor secure development practice?
5.
Why are APIs considered high-risk attack surfaces?
6.
What is the primary purpose of code reviews?
7.
Which of the following BEST supports secure session management?
8.
Why are third-party dependencies considered security risks?
9.
A developer disables authentication temporarily during testing and forgets to re-enable it before deployment. What type of issue is this?
10.
Which practice BEST protects application secrets?
11.
Why should applications avoid verbose error messages in production?
12.
Which of the following is an example of secure CI/CD practice?
13.
Why is authentication security important in application development?
14.
Which statement about security testing is MOST accurate?
15.
What should developers do if they discover a vulnerability in production code?
16.
Which of the following is a common secure development failure?
17.
Why should developers avoid trusting client-side validation alone?
18.
Which behaviour BEST supports secure software development?
19.
What may happen if secure development practices are ignored?
20.
What is the BEST overall approach to secure development?