LO5 SR

LO5 SR

University

8 Qs

quiz-placeholder

Similar activities

Google Calendar

Google Calendar

University

10 Qs

SCM and Logistics

SCM and Logistics

University

11 Qs

software development LAB

software development LAB

University

10 Qs

TIN HỌC ( ÔN THI ĐẦU RA 31 - 40)

TIN HỌC ( ÔN THI ĐẦU RA 31 - 40)

University

10 Qs

TOPIK 4: PERSEMBAHAN

TOPIK 4: PERSEMBAHAN

University

10 Qs

AB1401 Case Study: Facebook

AB1401 Case Study: Facebook

University

12 Qs

Vocabulary Quiz - Computer - 01

Vocabulary Quiz - Computer - 01

12th Grade - University

10 Qs

C Wrapup Quiz Deutsch

C Wrapup Quiz Deutsch

University

12 Qs

LO5 SR

LO5 SR

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Reem Ballaith

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not an industry standard report template

OWASP Top 10 2013

NST Special Publication 800-53

International Standard – ISO 27002

WASC Threat Classification V10.0

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How Appscan detects and XSS vulnerability?

By embedding a script in the page response

Because the response contains a redirection

Because the response contains SQL Server error

Because the Test Response (on the right) is identical to the Original Response (on the left)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What IS NOT an Appscan Standard Feature?

JavaScript and Ajax web crawling

Adobe Flash and Flex crawling

Glass box-assisted crawling

Graphic image crawling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How we can see the cookies information in Appscan?

By accessing the Application Data view, then click on Cookies

By accessing the Security Issues view, then click on Cookies

By accessing the Remediation Tasks view issues view, then click on Cookies

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack relies on an authenticated user to click a malicious link to perform an unintended action on the target application?

SQL Injection

Directory traversal

Cross Site Scripting

Cross-Site request forgery

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the policy that returns an overwhelming number of results?

Developer

Complete

Essential

Vital view Fiew

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How to identify that a user interaction is needed in a web page?

Check "User interactive needed" tab in the Application Data view

Check "User interactive needed" tab in the Security Issues view

Check "User interactive needed" tab in the Remediation Tasks view

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?