Search Header Logo

Top 5: Security Misconfiguration

Authored by CSM PSS

Other

Professional Development

Used 2+ times

Top 5: Security Misconfiguration
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the consequence of misconfigured HTTP headers?

Enhanced browser compatibility

Improved server performance

Reduced security, leading to various attacks such as XSS and clickjacking.

Faster loading times

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which misconfiguration can potentially expose internal IP addresses and server details?

Secure HTTP headers

Proper CORS configuration

Directory listing misconfiguration

Strong password policies

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

To prevent security misconfigurations the developer should:

Use default credentials

Not expose server versions

Whitelist domains/subdomains

Disable insecure HTTP methods

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following misconfigurations can result in sensitive data exposure? (Select all that apply)

Failing to implement Cross-Origin Resource Sharing (CORS) policies.

Leaving debug mode enabled in production environments.

Not encrypting data at rest.

Weak SSL/TLS configuration

Allowing unnecessary HTTP methods like TRACE and OPTIONS.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

PUT method can be used by an attacker:

Download sensitive information from the application

Upload files to the application

Delete files from the application

None of the above

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a Content Security Policy (CSP) header?

It controls the server's access to client resources.

It prevents clickjacking attacks and code injections by restricting the sources from which certain content can be loaded.

It encrypts sensitive data transmitted between the server and the client.

It ensures secure user authentication and authorization.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What security vulnerability is mitigated by using HTTP Strict Transport Security (HSTS) headers?

Cross-Site Scripting (XSS) attacks.

Man-in-the-Middle (MitM) attacks.

Session Fixation attacks.

Clickjacking attacks.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?