Web Application Security Testing-PreTest

Web Application Security Testing-PreTest

Professional Development

20 Qs

quiz-placeholder

Similar activities

DBMS-QUIZ

DBMS-QUIZ

Professional Development

20 Qs

LPC 16 - AIO

LPC 16 - AIO

Professional Development

20 Qs

General Quiz

General Quiz

Professional Development

18 Qs

command prompt

command prompt

4th Grade - Professional Development

15 Qs

Ports

Ports

Professional Development

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

CPU scheduling

CPU scheduling

Professional Development

16 Qs

1ºDAM/DAW - Lenguajes de Marcas - UD2-3-9 - Prof. C. Boni

1ºDAM/DAW - Lenguajes de Marcas - UD2-3-9 - Prof. C. Boni

University - Professional Development

20 Qs

Web Application Security Testing-PreTest

Web Application Security Testing-PreTest

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Omantel Ohi

Used 174+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following threats is most likely to be caused by poor input validation?

Enabling of IPSec

Insecure direct object reference

Insufficient transport layer protection

Insecure cryptographic storage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

Security Mis-configuration

Cross Site Scripting

Insecure Direct Object Reference

Broken Authentication and Session Management

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack technique that forces a user’s session credential or session ID to an explicit value

Brute Force Attack

Session Hijacking

Session Fixation

Dictionary Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat arises from not flagging HTTP cookies with tokens as secure?

Session Hijacking

Insecure Cryptographic Storage

Access Control Violation

Session Replay

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does malicious input flow in a DOM-based XSS?

From Server to Client

From Client to Server

From Attacker to Server

From Victim to Server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites

SQL injection

Cross Site Scripting

Malware Uploading

Man in the Middle

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What flaw can lead to exposure of resources or functionality to unintended actors?

Session Fixation

Improper authentication

Insecure Cryptographic Storage

Invalidated redirects and forwards

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?