Secure coding guidelines

Create an illustration of a modern software development environment with emphasis on secure coding practices, featuring elements like code snippets, secure passwords, and developers collaborating in a digital workspace.

Secure Coding Guidelines Quiz

Test your knowledge on secure coding practices and enhance your skills in software development. This quiz covers essential concepts that are vital for creating secure and efficient applications.

Participate to learn about:

  • Password storage best practices
  • Importance of code coverage
  • Asynchronous programming techniques
  • API design principles
16 Questions4 MinutesCreated by CodingGuard321
Fill in your name
1. Local memory is a good approach for caching, knowing that NxtPort uses distributed systems.
Correct
Not correct
Passwords are stored
Hard coded
In app settings
In key vault
3. When you create a client package for your (micro)service using Refit, what is Refit not used for?
An interface that defines your contract
Define your contract
Define your routes/endpoints
Setup authentication for your (micro)service
4. Within NxtPort, we aim to have a code coverage of at least
80%
85%
90%
5. What package do we use for input validation?
FluentValidation
UseFormInputValidation
Non of the above
6. Anemic Domain Model the use of a software domain model where the domain objects contain logic which can be implemented in a truly object-oriented way.
Correct
Not correct
7. Investigation, Alignment, Integration and Release are the four phases to implement third party components.
Correct
Not correct
8. When should you use async/await?
For calling domain services
For I/O bound operations
For calling extension methods
9. In Asynchronous Programming use await Task.Delay is used instead of Thread.Sleep when wishing to wait for a period of time.
Correct
Not correct
10. Within NxtPort we suggest to use .NET Core 3.1.x LTS Framework, .Net Standard 2.1, and C# 8.0 when setting up a new service but it is not mandatory.
Correct
Not correct
11. The only valuable effect of Test-Driven Development is to verify the operation of every single function of the program.
Correct
Not correct
12. Databases can be scripted using SQL DDL statements and FluentMigrations for P2.
Correct
Not correct
13. Following guidelines are used for API format:
GET method is used to alter the state
Singular and plural nouns can be mixed
Subresources are used if a resource is related to another resource
14. The Secure Coding Guidelines are only applicable for P2. Other security guidelines are put in place for the maintenance of the existing systems.
Correct
Not correct
15. C# encourages stateless logic and therefore well suited for horizonal scaling.
Correct
Not correct
{"name":"Secure coding guidelines", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on secure coding practices and enhance your skills in software development. This quiz covers essential concepts that are vital for creating secure and efficient applications.Participate to learn about:Password storage best practicesImportance of code coverageAsynchronous programming techniquesAPI design principles","img":"https:/images/course8.png"}
Powered by: Quiz Maker