Introduction To Information Security Answers Sheet
Introduction To Information Security Answers Sheet
###############################################################################
# #
# Note: Please read Questions before select answers on pretest quiz #
# Symbol represent Q = Question and A = Answers #
# #
###############################################################################
Q. Which of the following falls under the scope of Application Level Security?
A. SQL Injection
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
A. it lets the operating system know when the stack has been overwritten
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
Q. How does the HTTP POST method prevent leakage over the HTTP GET method?
A. keeping parameters out of the URL and headers of the HTTP request.
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
Q. To what degree does SSL help defend against SQL injection attacks?
A. secret key
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
A. Someone with the top secret clearance from writing an unclassified document
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
Q. what is Authentication ?
A. You are making the invalid assumption that people will audit your code from a
security perspective
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
Q. Under the same origin policy, which of the following URLs has the "same
origin�as: http://www.example.org/foo.html ?
A. http://www.example.org/bar.html
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
A. A certificate authority verifies her identity and gives her a unique certificate
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------
A. Making sure to interpret the statement parameters as data, and only data.
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------