Web Security: Common Vulnerabilities And Their Mitigation - The nonce attribute and the script hash

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it recommended to avoid using inline scripts on a secure website?
They can lead to cross-site scripting vulnerabilities.
They are not supported by all browsers.
They are difficult to maintain.
They increase the website's loading time.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the nonce attribute in a script tag?
To uniquely identify and whitelist a specific inline script.
To provide a fallback for unsupported browsers.
To improve the script's performance.
To specify the script's execution order.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How should a nonce be generated for each page response?
By using the same ID for all responses.
By using a secure random ID that changes with each response.
By using a timestamp.
By using a hardcoded value.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an alternative method to nonce for whitelisting inline scripts?
Using a script tag.
Using a script URL.
Using a script ID.
Using a script hash.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What must be done if the JavaScript content of a script tag changes?
The script tag must be removed.
The nonce must be updated.
The hash must be regenerated.
Nothing, the hash remains the same.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you obtain the hash for a script using Chrome developer tools?
By using a third-party tool.
By manually calculating the hash.
By running the script with the content security policy header set.
By inspecting the script tag in the HTML.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the report-only mode in content security policy?
To disable content security policy.
To report violations without enforcing restrictions.
To allow all scripts by default.
To enforce restrictions immediately.
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
Bash Shell Scripting- Writing Comments for a Shell Script

Interactive video
•
University
8 questions
Fundamentals of Secure Software - CSP (Content Security Policy)

Interactive video
•
University
8 questions
Python 3: Project-based Python, Algorithms, Data Structures - Bisection search - recursive implementation

Interactive video
•
University
8 questions
Bash Shell Scripting- Writing Comments for a Shell Script

Interactive video
•
University
6 questions
Discover SMB Vulnerabilities

Interactive video
•
University
11 questions
The Modern JavaScript Bootcamp (2019) - The Edit Note Page: Part II

Interactive video
•
University
8 questions
The Beginners 2022 Cyber Security Awareness Training Course - Browser Security Part III

Interactive video
•
University
11 questions
Web Security: Common Vulnerabilities And Their Mitigation - The nonce attribute and the script hash

Interactive video
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade