Question: Question 1 (1 point) What flaw can lead to exposure of resources or functionality to unintended actors? Question 1 options: Session Fixation Improper authentication Insecure

Question 1(1 point)

What flaw can lead to exposure of resources or functionality to unintended actors?

Question 1 options:

Session Fixation

Improper authentication

Insecure Cryptographic Storage

Invalidated redirects and forwards

Question 2(1 point)

You should set a secure flag in a cookie to ensure that:

Question 2 options:

The cookie is a persistent cookie

The cookie is sent over an encrypted channel

The cookie is deleted when the user closes the browser

The cookie is not available to client script

Question 3(1 point)

Which of the following functionalities should you include in an authentication and session management system? (Select all that apply)

Question 3 options:

Logout Functionality

Inactivity Time-out functionality

Escaping Functionality

Forwarding System Functionality

Question 4(1 point)

_________ is a collection of computers that are all infected by the same malware

Question 4 options:

botnet

malware

adware

spyware

Question 5(1 point)

Why should you use CAPTCHA?

Question 5 options:

To create cryptographically random session IDs

To protect credentials by using encryption or cryptographic salt and hash

To protect authentication systems from automated or brute-force attacks

To ensure that authentication systems implement inactivity timeout functionality

Question 6(1 point)

The use of proper security techniques can (Select all that apply)

Question 6 options:

Minimize the threat of attackers

Allow access to unauthorized users

Prevent most hackers from accessing your system

Provide full security

Question 7(1 point)

Which character is most likely to be used for an SQL injection attack?

Question 7 options:

Single quote (')

Null (\0) byte

Less than sign(<)

Greater than sign(>)

Question 8(1 point)

What is the name of the malware used to take over and link a large number of computers in order to execute a DDOS attack.

Question 8 options:

Phishing

Zero-Day Exploit

Social Engineering

Backdoor

Botnet

Question 9(1 point)

An HTTPS connection combines the protocol of HTTP with another Internet protocol for a layer of security.

Question 9 options:

FTPS

TLS

TCP

DNS

Question 10(1 point)

What is it called when a co-worker sitting next to you always seems to look your way when you try to enter your user ID and password to log onto the network?

Question 10 options:

phishing

social engineering

shoulder surfing

coincidence

Question 11(1 point)

Which of the following threats is most likely to be caused by poor input validation?

Question 11 options:

Enabling of IPSec

Insecure direct object reference

Insufficient transport layer protection

Insecure cryptographic storage

Question 12(1 point)

Which threat is most likely to occur when a POST parameter performs an operation on behalf of a user without checking a shared secret?

Question 12 options:

Cross Site Request Forgery

Insecure Direct Object Reference

Cross Site Scripting

Injection

Question 13(1 point)

What is the type of flaw that occurs when untrusted user entered data is sent to the interpreter as part of a query or command?

Question 13 options:

Insecure Direct Object References

Injection

Cross Site Request Forgery

Insufficient Transport Layer Protection

Question 14(1 point)

What threat arises from not flagging HTTP cookies with tokens as secure?

Question 14 options:

Session Hijacking

Insecure Cryptographic Storage

Access Control Violation

Session replay

Question 15(1 point)

Which of the following consequences is most likely to occur due to an injection attack

Question 15 options:

Spoofing

Cross-Site request Forgery

Denial Of Service

Insecure Direct Object Reference

Question 16(1 point)

Which attack can execute scripts in the user's browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites?

Question 16 options:

SQL injection

Cross Site Scripting

Malware Uploading

Man in the Middle

Question 17(1 point)

An attack technique that forces a user's session credential or session ID to an explicit value is called:

Question 17 options:

Brute Force Attack

Session Hijacking

Session Fixation

Dictionary Attack

Question 18(1 point)

Which of the following is most likely to result from invalidated redirects and forwards?

Question 18 options:

Brute Force Attack

Network Sniffing

Man In The Middle Attack

Bypassed Authorization attack

Question 19(1 point)

How does malicious input flow in a DOM-based XSS?

Question 19 options:

From Server to Client

From Client to Server

From Attacker to Server

From Victim to Server

Question 20(1 point)

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

Question 20 options:

Security Misconfiguration

Cross Site Scripting

Insecure Direct Object Reference

Broken Authentication and Session Management

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!