Search Header Logo

ASF quiz

Authored by Wim Haes

Computers

Professional Development

Used 15+ times

ASF quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Q1: Why do we perform security testing of our systems?

To increase the complexity of Software Development Lifecycle

To reduce the risk of attacks and data breaches

Public information that bank performs security testing will scare away potential hackers

To identify teams that create software with the worst quality

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Q2: ASF does NOT stand for what?

African Swine Flu

Application Security Framework

Affirmation Security Field

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Q3: Which of the following is NOT a type of security testing?

Black-box testing

Grey-box testing

Red-box tester

White-box tester

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Q4: What is OWASP Top 10?

List of 10 most common web application vulnerabilities

List of 10 recent web applications hacks that made it to the news

List of 10 most critical security risks to web applications

List of most basic web application vulnerabilities

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Q5: Why pentesters use <script>alert(1)</script> phrase while looking for Cross-Site Scripting vulnerabilities?

JavaScript alert(1) function allows execution of code on the server side

JavaScript alert(1) function allows exfiltration of victim’s cookies to the attacker

JavaScript alert(1) function is not a destructive as other JavaScript functions, such as console.log() or confirm()

JavaScript alert(1) function is a proof that JavaScript was executed in the context of a web page

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Media Image

Q6: What type of vulnerability is presented below?

SQL injection

Command injection

Server-Side Request Forgery

Cross-Site Scripting

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Q7: What type of vulnerabilities is static code analysis NOT suitable for?

Insecure coding

Implementation bugs

Design flaws

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?