- 10 hours
- Medium
Free online content available in this course.
course.header.alt.is_video
course.header.alt.is_certifying
Got it!Last updated on 4/2/20
Apply advanced strategies to maintaining your application's security
Evaluated skills
- Apply advanced strategies to maintaining your application's security
Question 1
How is security compliance verified?
An application that follows OWASP standards is automatically considered security compliant.
A third party vendor is required to certify a web application as security compliant.
Only a CTO can verify security compliance.
The lead back-end developer on a project must test the application for compliance.
Question 2
If a web application is designed from the start to be OWASP compliant, is there any reason to be concerned with the application's security?
Careful, there are several correct answers.No, because OWASP is the most comprehensive standard for web security.
Yes, because new vulnerabilities can arise with modifications to the application.
Yes, because new vulnerabilities can arise as threats to web security evolve.
Yes, if stricter regulations like HIPAA or PCI DSS apply to the application or your business.
Question 3
In which of the following ways does peach fuzzing, or testing random inputs on your web application, help your application?
Careful, there are several correct answers.It automates the line-by-line analysis of your code for vulnerabilities.
It helps you beat SQL injection and XSS attacks.
It checks your app's resilience against the dark web.
It ensures that proper validation techniques are used.
- Up to 100% of your training program funded
- Flexible start date
- Career-focused projects
- Individual mentoring