13: Application Security Quiz

13: Application Security Quiz

University

6 Qs

quiz-placeholder

Similar activities

InfoSec: C.I.A. Triangle

InfoSec: C.I.A. Triangle

10th Grade - University

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

 Theft and Script Kiddies

Theft and Script Kiddies

University

10 Qs

CS-nov15th

CS-nov15th

10th Grade - University

10 Qs

Basic cyber security knowledge

Basic cyber security knowledge

KG - University

9 Qs

SE Quiz 3 (FG)

SE Quiz 3 (FG)

University

10 Qs

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

University

9 Qs

FEATURE SELECTION

FEATURE SELECTION

University

10 Qs

13: Application Security Quiz

13: Application Security Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Hiba AlFarsi

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When two or more events try to execute at the same time, causing the system to be unstable and vulnerable to an attack.

Authentication attacks

Buffer overflows

Race conditions

Input validation attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack target user identity and can be stopped by applications strong passwords ?

Authorization attacks

Race conditions

Input validation attacks

Authentication attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can be solved by using "Principle of least privilege" ?

Authorization attacks

Race conditions

Input validation attacks

Authentication attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can occur when we do not properly account for the size of the data input into our applications?

Buffer overflows

Race conditions

Input validation attacks

Authorization attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can occur when multiple processes or multiple threads within a process control or share access to a particular resource, and the correct handling of that resource depends on the proper ordering or timing of transactions?

Authorization attacks

Race conditions

Buffer overflows

Input validation attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can occur when attackers target encryption algorithms or implementations to steal sensitive data or disrupt secure communications?

Buffer overflows

Cryptographic attacks

Race conditions

Authorization attacks