Desarrollo Seguro 2019

Desarrollo Seguro 2019

University

9 Qs

quiz-placeholder

Similar activities

Scratch

Scratch

KG - Professional Development

10 Qs

Quality costs

Quality costs

University

10 Qs

Structured/Traditional SDM

Structured/Traditional SDM

University

9 Qs

 QUIZ  MS Core Java Quiz-3 2023

QUIZ MS Core Java Quiz-3 2023

University

11 Qs

Nuclear Medicine Intro

Nuclear Medicine Intro

University

12 Qs

QUIZ GAME

QUIZ GAME

University

10 Qs

Redes de computadoras Topologías

Redes de computadoras Topologías

University

10 Qs

computer Networks

computer Networks

University

10 Qs

Desarrollo Seguro 2019

Desarrollo Seguro 2019

Assessment

Quiz

Science, Computers, Professional Development

University

Practice Problem

Hard

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In which of the following scenarios should you use the escaping technique?

When you need to validate any input as valid input

When user input is echoed back to the user in HTML

When you are trying to protect against regular expression injection

When you need to tell the interpreter that input is code

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is most likely to result from unvalidated redirects and forwards?

Brute force attack

Network sniffing

Man-in-the-middle attack

Bypassed authorization checks

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following should you use to protect the connections between the physical tiers of your application?

EFS

SSL

HTTP

Kerberos

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following combines public-key cryptography with a cryptographic hash?

Nonce

Digital Signature

SSL

Salt

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following mistakes is most often associated with a security misconfiguration threat?

Cross-site request forgery

Failure to disable default accounts

Bad cryptography

Unsafe key storage

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an authentication system mandatory requirement?

Form variables are used for managing session IDs.

Use a GOTCHA to prevent automated attacks.

User logout and session inactivity controls.

Session IDs are only accepted from cookies and parameter variables.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the best way to ensure that JavaScript cannot be used to access a cookie?

Set the secure flag in the cookie

Set the HttpOnly flag in the cookie

Use the CAPTCHA system

Use non-persistent cookies

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following consequences are most likely to occur due to an injection attack? (Choose Two.)

Spoofing

Data loss

Denial of service

Insecure direct object references

9.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.)

Find out if a suitable framework component already exists.

Find out if you can use a small extension to an existing component to implement the system.

Find out if form variables are available to store data.

Find out if you need to use session-based indirection.