Metadata
Technology & Computer Science Adult Learning Apply Medium-
Subject
Technology & Computer Science
-
Education level
Adult Learning
-
Cognitive goals
Apply
-
Difficulty estimate
Medium
-
Tags
rbac, jwt, middleware, web-security, access-control
-
Number of questions
5
-
Created on
-
Generation source
-
License
CC0 Public domain
-
Prompt
Assess learners' ability to design and implement role-based access control in a web application using JWTs and middleware. Scope includes defining roles and permissions, embedding and validating role claims in JWTs, secure token issuance/expiration/refresh and revocation strategies, middleware patterns to enforce role- and permission-based route protection, error handling and least-privilege design, and writing brief middleware pseudocode or snippets and tests for a common framework (e.g., Express, Django, ASP.NET). Tasks require applied solutions: JWT claim format, middleware logic, sample protected routes, and security trade-offs.
Review & Revise
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%
Mock data used for demo purposes.