Application Security I

Application Security I

Professional Development

13 Qs

quiz-placeholder

Similar activities

SJDMNHS Google Classroom 2

SJDMNHS Google Classroom 2

Professional Development

10 Qs

แบบทดสอบบทที่3

แบบทดสอบบทที่3

Professional Development

10 Qs

Guess the Retro Computer 1

Guess the Retro Computer 1

KG - Professional Development

13 Qs

Unit 1 lesson 1

Unit 1 lesson 1

University - Professional Development

15 Qs

CodeMonkey Platform Management & Resources

CodeMonkey Platform Management & Resources

Professional Development

10 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

Computer basics for beginners

Computer basics for beginners

Professional Development

15 Qs

GUESS THAT WORD IN CYBER!

GUESS THAT WORD IN CYBER!

Professional Development

10 Qs

Application Security I

Application Security I

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Luis Torres

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following scenarios is most likely to cause an injection attack?

A Web application does not validate a client’s access to a resource.

Unvalidated input can be distinguished from valid instructions.

Unvalidated input is embedded in an instruction stream.

A Web action performs an operation on behalf of the user without checking a shared secret.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You should set a secure flag in a cookie to ensure that:

The cookie is a persistent cookie.

The cookie is not available to client script.

The cookie is sent over an encrypted channel.

The cookie is deleted when the user closes the browser.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which character is most likely to be used for an SQL injection attack?

Null

Less than sign(<)

Greater than sign(>)

Single quote (')

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?

Reflected XSS

Persistent XSS

Insecure direct object references

Failure to restrict URL access

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the best way to protect against injection attacks?

Input validation using an allow list

SQL queries based on user input

Memory size checks

Validate integer values before referencing arrays

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following input sources can be directly controlled by a malicious user?

Server configuration files

GET/POST parameters

Network ports

Server code

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to?

Injection

Security misconfiguration

Insecure cryptographic storage

Cross-site request forgery

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?