Web Application Security Testing-PreTest

Web Application Security Testing-PreTest

Professional Development

20 Qs

quiz-placeholder

Similar activities

Active Directory

Active Directory

Professional Development

15 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

QUIZZ 2 AIJ XII TKJ

QUIZZ 2 AIJ XII TKJ

Professional Development

15 Qs

Exam Questions NSE4_FGT-7.0 Fortinet NSE 4 - FortiOS 7.0

Exam Questions NSE4_FGT-7.0 Fortinet NSE 4 - FortiOS 7.0

Professional Development

22 Qs

MTA: 98-367 Security Part 3

MTA: 98-367 Security Part 3

KG - Professional Development

15 Qs

3_Skill Quiz on Application Attacks

3_Skill Quiz on Application Attacks

Professional Development

16 Qs

Web Application Security Testing-PreTest

Web Application Security Testing-PreTest

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Omantel Ohi

Used 172+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following threats is most likely to be caused by poor input validation?

Enabling of IPSec

Insecure direct object reference

Insufficient transport layer protection

Insecure cryptographic storage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

Security Mis-configuration

Cross Site Scripting

Insecure Direct Object Reference

Broken Authentication and Session Management

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack technique that forces a user’s session credential or session ID to an explicit value

Brute Force Attack

Session Hijacking

Session Fixation

Dictionary Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat arises from not flagging HTTP cookies with tokens as secure?

Session Hijacking

Insecure Cryptographic Storage

Access Control Violation

Session Replay

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does malicious input flow in a DOM-based XSS?

From Server to Client

From Client to Server

From Attacker to Server

From Victim to Server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites

SQL injection

Cross Site Scripting

Malware Uploading

Man in the Middle

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What flaw can lead to exposure of resources or functionality to unintended actors?

Session Fixation

Improper authentication

Insecure Cryptographic Storage

Invalidated redirects and forwards

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?