Starter Quiz
Question 1 of 6
1
of 6
Match the following techniques to their purposes:
Click and drag answers to change the order, or select using
↹
Tab
then move by pressing
Space
and the
↑
↓
arrows on your keyboard.
prevent harmful code from user input
add a layer of security against unauthorised access
identify and fix vulnerabilities in software
input sanitisation
strong passwords
code reviews
Link techniques to their security roles.
Need a hint?
Check