1. When implementing a secure login feature in an object-oriented
program, which data type is most appropriate for storing passwords?
A) String
B) Integer
C) Char Array
D) Boolean
Answer: C) Char Array
Rationale: Char arrays are preferred over strings for storing passwords
because they can be explicitly overwritten in memory, reducing the risk of
password exposure through memory dumps.
2. In the context of cybersecurity, why is it important to use modular
programming when developing software?
A) It simplifies the code.
B) It makes the program run faster.
C) It helps in isolating security breaches to individual modules.
D) It reduces the overall size of the program.
Answer: C) It helps in isolating security breaches to individual modules.
Rationale: Modular programming allows developers to isolate parts of
the program, making it easier to identify and fix security breaches without
affecting the entire system.
3. Which operator would be used to ensure that two different conditions
must be true for a cybersecurity protocol to proceed?
A) OR (||)
B) AND (&&)
C) NOT (!)
D) XOR (^)
Answer: B) AND (&&)
Rationale: The AND operator ensures that both conditions are true,
which is often required in security protocols to proceed with sensitive
operations.
4. What is the significance of using decision structures in cybersecurity
software development?
A) They allow the program to execute actions conditionally.
B) They make the code easier to read.
C) They prevent the software from crashing.
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |