7.7 Software Security Review

7.7 Software Security Review

8th Grade

15 Qs

quiz-placeholder

Similar activities

POST TEST BASIS DATA KELAS 11

POST TEST BASIS DATA KELAS 11

11th Grade

10 Qs

Prueba Corta U2 - (G1, G2 y G3) PHP y MySql

Prueba Corta U2 - (G1, G2 y G3) PHP y MySql

9th Grade

10 Qs

CompTIA ITF+ - Database Vocabulary

CompTIA ITF+ - Database Vocabulary

9th - 12th Grade

20 Qs

JDBC

JDBC

University

20 Qs

DBMS

DBMS

University

10 Qs

Database

Database

8th - 12th Grade

10 Qs

SQL

SQL

10th - 12th Grade

11 Qs

Day 1 - Deployment ...

Day 1 - Deployment ...

University

15 Qs

7.7 Software Security Review

7.7 Software Security Review

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Kristie Hernandez

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Client-server applications

A. are any apps that run on personal devices and need access to resources from a server.
B. are distributed resources across multiple apps or devices.
C. provide services such as data sharing and web pages.
D. include database, file, mail, print, web, and game servers
E. are also known as front-end and back-end applications.


All options are correct.


B and E

All options except D

A, C, and D

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The SQL query: SELECT name, id FROM Employee; will return

the name and id columns, in that order.

the Employee table.

the id and name columns, in that order.

nothing because the SQL syntax is incorrect.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What happens during a SQLi attack? (SELCT ALL THAT APPLY)

A. A malicious actor uses SQL to get the database to reveal its contents.

B. Nothing happens as this is an old form of attack and no longer relevant because of newer cybersecurity protocols.

C. Malicious SQL statements are placed somewhere within a web page or application's input or URL.

D. Hackers can gain access to sensitive data, such as PII, credit card information, and login credentials.

E. This is considered a low-level attack and not destructive on a large scale so typically the most an attacker can do is render web pages differently to an end user.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Some of the best ways to prevent or at least mitigate a SQLi attack are to

A. Keep data separate from commands and queries
B. Use a safe API
C. Reduce the amount of SQL used overall
D. Use server-side input validation
E. Use other SQL controls to prevent mass disclosure of records
F. Avoid leaving any raw SQL in the code
G. Have SQL reside behind multiple layers in the code base and not accessible by the site

C, E, F, and G

A, B, and D


A, B, C, and D

All options are correct.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using view page source allows you to quickly see the following:

A. The HTML that marks up the page
B. Images used and their location in a site folder
C. Fonts and icons
D. Stylesheets
E. Server-side scripts that bring in information from a database, such as search engines, forums, etc.
F. JavaScript within a <script> element
G. JavaScript outside of a <script> element


All options are correct.


A, B, C and D


A, B, C, D, and F

All except E

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Developer tools can help with

A. Testing and debugging a site or web app.
B. Diagnosing problems quickly on a site or web app.
C. Building and maintaining a more secure site or web app.
D. Modifying site or web app elements and sending the changes back to the server.
E. Changing code in real-time to see how it impacts the site or web app on the fly.

All except D.

A, B, and C

D only

All options are correct.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A database is always comprised of

personally identifying information.

tables with rows and columns.

lots of cryptographically stored symbols.

lots of little databases.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?