Top 5: Security Misconfiguration

Top 5: Security Misconfiguration

Professional Development

10 Qs

quiz-placeholder

Similar activities

INFOSEC WEEK DAY 5 QUIZ

INFOSEC WEEK DAY 5 QUIZ

Professional Development

10 Qs

Media Literacy - LIS 5503

Media Literacy - LIS 5503

10th Grade - Professional Development

15 Qs

CNS1

CNS1

Professional Development

11 Qs

ICT Quiz CH:1.6

ICT Quiz CH:1.6

KG - Professional Development

15 Qs

Cyber security trainig

Cyber security trainig

Professional Development

14 Qs

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

ISM and ISPS

ISM and ISPS

Professional Development

10 Qs

DMK_U7

DMK_U7

Professional Development

10 Qs

Top 5: Security Misconfiguration

Top 5: Security Misconfiguration

Assessment

Quiz

Other

Professional Development

Medium

Created by

CSM PSS

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the consequence of misconfigured HTTP headers?

Enhanced browser compatibility

Improved server performance

Reduced security, leading to various attacks such as XSS and clickjacking.

Faster loading times

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which misconfiguration can potentially expose internal IP addresses and server details?

Secure HTTP headers

Proper CORS configuration

Directory listing misconfiguration

Strong password policies

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

To prevent security misconfigurations the developer should:

Use default credentials

Not expose server versions

Whitelist domains/subdomains

Disable insecure HTTP methods

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following misconfigurations can result in sensitive data exposure? (Select all that apply)

Failing to implement Cross-Origin Resource Sharing (CORS) policies.

Leaving debug mode enabled in production environments.

Not encrypting data at rest.

Weak SSL/TLS configuration

Allowing unnecessary HTTP methods like TRACE and OPTIONS.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

PUT method can be used by an attacker:

Download sensitive information from the application

Upload files to the application

Delete files from the application

None of the above

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a Content Security Policy (CSP) header?

It controls the server's access to client resources.

It prevents clickjacking attacks and code injections by restricting the sources from which certain content can be loaded.

It encrypts sensitive data transmitted between the server and the client.

It ensures secure user authentication and authorization.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What security vulnerability is mitigated by using HTTP Strict Transport Security (HSTS) headers?

Cross-Site Scripting (XSS) attacks.

Man-in-the-Middle (MitM) attacks.

Session Fixation attacks.

Clickjacking attacks.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?