Search Header Logo

Web Application Security Testing-PostTest

Authored by Priya Gupta

Other

Professional Development

Used 7+ times

Web Application Security Testing-PostTest
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping

Security Mis-configuration

Cross Site Scripting

Insecure Direct Object References

Broken Authentication and Session Management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which character is most likely to be used for an SQL injection attack

Single quote (')

Null (\0) byte

Less than sign(<)

Greater than sign(>)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?

Reflected XSS

Persistent XSS

Insecure Direct Object Reference

Failure to Restrict URLs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack technique that forces a user’s session credential or session ID to an explicit value.

Brute Force Attack

Session hijacking

Session Fixation

Dictionary attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best way to ensure that JavaScript cannot be used to access a cookie

Set the Secure Flag in the Cookie

Set the HTTP only Flag in the Cookie

Use the CAPTCHA System

Use non-persistent cookie

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat arises from not flagging HTTP cookies with tokens as secure

Session Hijacking

Insecure Cryptographic Storage

Access Control Violation

Session replay

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites

SQL injection

Cross-Site Scripting

Malware Uploading

Man In The Middle Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?