You do not have access to this content.
In order to access the 'Quiz Zone' and all of its contents, please purchase a 'Premium Course'.
Quiz Summary
0 of 10 questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Development 0%
-
Aaah, relax, its over! Now take a look at your result and spend further time revising any areas of the test that you got incorrect.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Incorrect
-
Question 1 of 10
1. Question
Tick 2 possible outcomes that might occur if programs are not robust.
CorrectIncorrect -
Question 2 of 10
2. Question
Which statement best describes 'Input Sanitisation'?
CorrectIncorrect -
Question 3 of 10
3. Question
Which statement best describes 'Input Validation'?
CorrectIncorrect -
Question 4 of 10
4. Question
A whitelist is when...
CorrectIncorrect -
Question 5 of 10
5. Question
A blacklist is when...
CorrectIncorrect -
Question 6 of 10
6. Question
Which statement best describes the term authentication?
CorrectIncorrect -
Question 7 of 10
7. Question
What is meant by the term 'maintainable code'?
CorrectIncorrect -
Question 8 of 10
8. Question
What is meant by the term 'authentication'?
CorrectIncorrect -
Question 9 of 10
9. Question
List all methods of computer system authentication from the list below:
CorrectIncorrect -
Question 10 of 10
10. Question
How is commenting on code a good defence strategy?
CorrectIncorrect