Week 13b

Week 13b

University

10 Qs

quiz-placeholder

Similar activities

JAVA QUIZ-1

JAVA QUIZ-1

University

10 Qs

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

BB

BB

University

10 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

CodeMonkey for B.Ed IT

CodeMonkey for B.Ed IT

University

10 Qs

Computational Thinking in Python[Quiz 3]

Computational Thinking in Python[Quiz 3]

University

15 Qs

JRB2 Quiz 4

JRB2 Quiz 4

University

10 Qs

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

University

10 Qs

Week 13b

Week 13b

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

A Moreno

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your application sets a cookie with Secure attribute. What does this mean?

The cookie can not be accessed by JavaScript

The cookie will not be sent cross-domain

Client will send the cookie only over an HTTPS connection

none of these

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The session ID must be renewed after...

A short idle period (ie. 30 seconds)

When a new window is created

Any privilege level change

A client logs in

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your web server supports secure (HTTPS) connections. By design, which of the following is the best way to make sure a client will not accidentally request a page over non-secure HTTP connection?

Completely close port 80

Use HTTP Strict-Transport-Security

Redirect all requests for port 80 to port 443

disable port 433

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your application performs logging queries after certain events. Timestamp, IP address, POST payload and a type of action will be saved to a MySQL database. Is it possible for an adversary to bypass this logging query by sending specifically crafted POST payload?

No, if escaping is used (ie. mysql_real_escape_string() function in PHP)

Yes, further validation is needed on the input data

No, if the SQL query is performed using a prepared statement with correctly set character encoding

Yes, because posts are generally associated with malicious payloads

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You use a 104-bit, cryptographically strong, random number (hexadecimal encoded, for example) as your password on a web site which stores passwords as plain MD5 hashes: md5 (password). Is it safe to assume your password will be safe if the user database leaks?

Yes

No, because of the broken collision resistance of MD5

maybe...?

No, because of the lack of salting and stretching

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are running Apache + PHP server. PHP runs as an Apache module:

AddHandler php5-script .php

You allow users to upload avatar images (in PNG format). Avatar filename is allowed to contain characters: "a-z0-9.-".

Is it safe to assume you are secure against PHP code execution launched via uploaded files?

Yes, if I make sure the filename ends with .png extension

occassionally

No, further configuration is needed on the server-side

Yes, if I reject files that do not pass getimagesize()

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your PHP application reads user submitted XML documents using DOM. You fetch certain element values from the XML:

$doc = new DOMDocument();

$doc->loadXML($xml);

$params = $doc->getElementsByTagName('parameters');

You display some of those parameters on the user's account settings page. Is it possible to exploit this scenario with a maliciously crafted XML document?

yes

No, if I make sure the user submitted XML is well-formed

maybe?

No, if I escape the data before displaying on the account page

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers