Search Header Logo

Web Application Security Quiz

Authored by Reem Ballaith

Computers

University

Web Application Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Encrypting data with SSL will not guarantee the safety of a website, because: a. This only protects data between the website and user, not the Web application itself. (A) b. This approach ignores the security of the software on the network or Web server. c. This only protects data transmitted through port 443. d. The encryption used by SSL is not strong.

This only protects data between the website and user, not the Web application itself. (A)

This approach ignores the security of the software on the network or Web server.

This only protects data transmitted through port 443.

The encryption used by SSL is not strong.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another term for DAST? a. White box testing. b. Black box testing. (A) c. Glass box testing. d. Gray box testing.

White box testing.

Black box testing. (A)

Glass box testing.

Gray box testing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack target a website’s method of validating the identity of a user? a. Authorization. b. Authentication. (A) c. Identity attack. d. Client-side attack.

Authorization.

Authentication. (A)

Identity attack.

Client-side attack.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which HTTP method sends data to the server? a. GET b. POST (A) c. PUT d. SEND

GET

POST (A)

PUT

SEND

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker enters the following script into the search box or an entry form: . The hacker then clicks the search button and a pop-up window appears stating It Worked. What you conclude from this? a. The site is susceptible to buffer overflow b. The site is susceptible to SQL injection c. The site is susceptible to parameter tampering d. The site is susceptible to XSS (A)

The site is susceptible to buffer overflow

The site is susceptible to SQL injection

The site is susceptible to parameter tampering

The site is susceptible to XSS (A)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In electronic authentication, which of the following controls is effective against cross-site scripting (XSS) vulnerabilities? a. Sanitize inputs to make them non executable. (A) b. Insert random data into any linked uniform resource locator c. Insert random data into a hidden field d. Use a per-session shared secret

Sanitize inputs to make them non executable. (A)

Insert random data into any linked uniform resource locator

Insert random data into a hidden field

Use a per-session shared secret

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CSRF stands for a. Cross State Request Forgery b. Cross Site Reply Forgery c. Cross Site Request Forgery (A) d. Cross State Reply Forgery.

Cross State Request Forgery

Cross Site Reply Forgery

Cross Site Request Forgery (A)

Cross State Reply Forgery.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?