Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Question Stats
26.03.2018
Jeroen Willemsen
Principal Security Architect at Xebia
Java

Which of the following statements are true ? (You can choose multiple)

574 answers
28 good - 546 bad
 
26.03.2018
Jeroen Willemsen
Principal Security Architect at Xebia
Java

Which of the following type of keystores applies encryption to the keys stored in them :

548 answers
84 good - 464 bad
 
26.03.2018
Jeroen Willemsen
Principal Security Architect at Xebia
Java

Which off the following are part of the modern ciphersuite for TLS ?

202 answers
112 good - 90 bad
 
26.03.2018
Jeroen Willemsen
Principal Security Architect at Xebia
Java

Which of the following Ciphers will do the least mutation on the plaintext when it is offered to...

502 answers
317 good - 185 bad
 
26.03.2018
Jeroen Willemsen
Principal Security Architect at Xebia
Java

Given the following code, what will happen when you run it given only the standard security...

286 answers
198 good - 88 bad
 
26.03.2018
Jeroen Willemsen
Principal Security Architect at Xebia
Java

Which is the recommended padding scheme for an RSA signature ?

229 answers
108 good - 121 bad
 
26.03.2018
Jeroen Willemsen
Principal Security Architect at Xebia
Java

Which of the following actions can actually wipe information from memory ?

111 answers
18 good - 93 bad