0
0
Cybersecurityknowledge~10 mins

Security design patterns in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to name the security design pattern that limits access to resources.

Cybersecurity
The [1] pattern restricts access to resources based on permissions.
Drag options to blanks, or click blank then click option'
ASingleton
BFactory
CObserver
DAccess Control
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing it with design patterns that manage object creation.
2fill in blank
medium

Complete the code to identify the pattern that separates security checks from business logic.

Cybersecurity
The [1] pattern helps keep security checks separate from the main application code.
Drag options to blanks, or click blank then click option'
AAdapter
BProxy
CInterceptor
DDecorator
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing it up with Proxy, which controls access but not interception.
3fill in blank
hard

Fix the error in naming the pattern that ensures only one instance of a security manager exists.

Cybersecurity
The [1] pattern ensures a single instance of a security manager is used.
Drag options to blanks, or click blank then click option'
ASingleton
BFactory
CObserver
DBuilder
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing with Factory, which creates objects but does not limit to one.
4fill in blank
hard

Fill both blanks to complete the pattern that controls access by wrapping the original object.

Cybersecurity
The [1] pattern uses a [2] to control access to an object.
Drag options to blanks, or click blank then click option'
AProxy
BAdapter
CWrapper
DDecorator
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing Proxy with Adapter, which changes interface but not access control.
5fill in blank
hard

Fill all three blanks to complete the pattern that authenticates users before allowing actions.

Cybersecurity
The [1] pattern checks the [2] of a user and grants [3] accordingly.
Drag options to blanks, or click blank then click option'
AAuthentication
Bidentity
Cpermissions
DAuthorization
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing Authentication with Authorization, which is about permissions, not identity.