Application Security I

Application Security I

Professional Development

13 Qs

quiz-placeholder

Similar activities

Working with PHP Quiz

Working with PHP Quiz

Professional Development

10 Qs

CCNP-Route-Post-Assessment

CCNP-Route-Post-Assessment

Professional Development

15 Qs

QUIZZ 2 AIJ XII TKJ

QUIZZ 2 AIJ XII TKJ

Professional Development

15 Qs

11142020_A+_Lesson_1_Quiz

11142020_A+_Lesson_1_Quiz

Professional Development

9 Qs

SCRUM MEETING

SCRUM MEETING

Professional Development

8 Qs

KTVE#11 Zoom Quiz

KTVE#11 Zoom Quiz

Professional Development

10 Qs

Choosing the Right Chart Type: Modules 1A–1D

Choosing the Right Chart Type: Modules 1A–1D

Professional Development

8 Qs

Software Testing Methodologies and Standards

Software Testing Methodologies and Standards

Professional Development

15 Qs

Application Security I

Application Security I

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Luis Torres

Used 2+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following scenarios is most likely to cause an injection attack?

A Web application does not validate a client’s access to a resource.

Unvalidated input can be distinguished from valid instructions.

Unvalidated input is embedded in an instruction stream.

A Web action performs an operation on behalf of the user without checking a shared secret.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You should set a secure flag in a cookie to ensure that:

The cookie is a persistent cookie.

The cookie is not available to client script.

The cookie is sent over an encrypted channel.

The cookie is deleted when the user closes the browser.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which character is most likely to be used for an SQL injection attack?

Null

Less than sign(<)

Greater than sign(>)

Single quote (')

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?

Reflected XSS

Persistent XSS

Insecure direct object references

Failure to restrict URL access

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the best way to protect against injection attacks?

Input validation using an allow list

SQL queries based on user input

Memory size checks

Validate integer values before referencing arrays

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following input sources can be directly controlled by a malicious user?

Server configuration files

GET/POST parameters

Network ports

Server code

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to?

Injection

Security misconfiguration

Insecure cryptographic storage

Cross-site request forgery

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?