2.1 Security Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a key principle for data protection?

A

Encrypt in transit and at rest.

This ensures that sensitive data is protected during transmission and while stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should be done to prevent XSS and SQL injection?

A

Sanitize all user inputs or any input parameters exposed to user.

This involves cleaning and validating data received from users to eliminate harmful code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technique should be used to prevent SQL injection?

A

Use parameterized queries.

This method ensures that user input is treated as data, not executable code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege?

A

Users should have the minimum level of access necessary to perform their tasks.

This reduces the risk of unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a recommended source for further reading on security?

A

API security checklist.

This resource provides guidelines for securing APIs against common vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is another recommended source for developers regarding security?

A

Security guide for developers.

This guide offers best practices for integrating security into the development process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What list is crucial for understanding web application security threats?

A

OWASP top ten.

This list outlines the most critical security risks to web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly