Web Application Security Quiz

Web Application Security Quiz

University

15 Qs

quiz-placeholder

Similar activities

Machine Learning (Introduction)

Machine Learning (Introduction)

University

10 Qs

INTERNET

INTERNET

University

20 Qs

1.1.1 The structure and function of the processor

1.1.1 The structure and function of the processor

11th Grade - University

15 Qs

WML & WAP

WML & WAP

University

20 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

Software Engineering Quiz 1

Software Engineering Quiz 1

University

20 Qs

Python List

Python List

4th Grade - University

15 Qs

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

Web Application Security Quiz

Web Application Security Quiz

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Keitumetse Taumoloko

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between content spoofing and reflected XSS?

Content spoofing is a subset of XSS, while reflected XSS involves submitting malicious javascript code in HTTP requests

Content spoofing uses advanced javascript frameworks, while reflected XSS considers the types of input in HTTP requests

Content spoofing involves running attack-driven code in the client browser, while reflected XSS hides legitimate page content with absolutely positioned elements

Content spoofing allows users to change a portion of the URL to modify content directly, while reflected XSS involves tampering with HTTP requests

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first line of defense for every web application against XSS?

Html validation and sanitisation

Secure JSON patterns

Contextual output encoding

Input validation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique converts data to a form that is display-only and prevents the execution of javascript or rendering of HTML tags?

Html validation and sanitisation

Input validation

Secure JSON patterns

Contextual output encoding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When should you use HTML validation and sanitisation?

When you want to allow all HTML without any restrictions

When you want users to submit any HTML to your website

When you want to allow only a limited subset of HTML and remove dangerous attributes

When you want to eliminate all HTML from user submissions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using secure JSON patterns in web applications?

To deliver an HTML file without data and then populate it with JSON

To populate HTML files with untrusted data directly

To increase the attack surface by allowing untrusted data in JSON

To prevent XSS attacks by parsing JSON data using the eval function

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which context requires different encoding methods depending on where untrusted data is inserted into the webpage?

Javascript block content

Javascript attribute context

Attribute context

HTML context

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the recommended approach to parse JSON data in modern applications?

Use JSON.parse to avoid untrusted data in JSON

Use the eval function to prevent untrusted data from coming through

Use HTML sanitisation to parse JSON data

Use unpopulated HTML files for JSON data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers