
Application Security I
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Medium
Luis Torres
Used 2+ times
FREE Resource
Enhance your content in a minute
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following scenarios is most likely to cause an injection attack?
A Web application does not validate a client’s access to a resource.
Unvalidated input can be distinguished from valid instructions.
Unvalidated input is embedded in an instruction stream.
A Web action performs an operation on behalf of the user without checking a shared secret.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You should set a secure flag in a cookie to ensure that:
The cookie is a persistent cookie.
The cookie is not available to client script.
The cookie is sent over an encrypted channel.
The cookie is deleted when the user closes the browser.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which character is most likely to be used for an SQL injection attack?
Null
Less than sign(<)
Greater than sign(>)
Single quote (')
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?
Reflected XSS
Persistent XSS
Insecure direct object references
Failure to restrict URL access
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is the best way to protect against injection attacks?
Input validation using an allow list
SQL queries based on user input
Memory size checks
Validate integer values before referencing arrays
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following input sources can be directly controlled by a malicious user?
Server configuration files
GET/POST parameters
Network ports
Server code
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to?
Injection
Security misconfiguration
Insecure cryptographic storage
Cross-site request forgery
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
UDC 2022
Quiz
•
Professional Development
10 questions
Mastering KineMaster
Quiz
•
Professional Development
10 questions
Git & Github
Quiz
•
Professional Development
11 questions
KOE034: Sensors and Instruments
Quiz
•
Professional Development
10 questions
Cloud computing 2
Quiz
•
Professional Development
14 questions
Linux Command Line Quiz
Quiz
•
Professional Development
10 questions
Weekly Quiz 1
Quiz
•
4th Grade - Professio...
11 questions
Fortnite
Quiz
•
5th Grade - Professio...
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
25 questions
Christmas Movies
Quiz
•
Professional Development
20 questions
Christmas Trivia
Quiz
•
Professional Development
15 questions
Fun Holiday Trivia
Quiz
•
Professional Development
25 questions
Name That Tune - Christmas
Quiz
•
Professional Development
29 questions
Christmas Song Emoji Pictionary
Quiz
•
Professional Development
9 questions
Holiday Movie Trivia
Lesson
•
Professional Development
34 questions
Winter Trivia
Quiz
•
Professional Development
