Quiz1
Quiz1
Following are the reasons why software applications are vulnerable except?
-Poor data validation
- Design Flaws
-Application environment bottlenecks
-Reasonable use of expectations
Identify the most relevant security practice crucial to address the"Attempted injection
attacks" in the use case of "Input validation"
-Enforcing strong password policies
-Conducting regular security audits
- Implementing input validation and sanitization
-Encrypting sensitive user inputs
Which of the following ports are normally open on perimeter devices fo web traffic
leading to application-level vulnerabilities exploited by attac into the network?
443 and 8080
80 and 445
443 and 80
43 and 80
Cookies are used to maintain session state information in stateless HT where they are
vulnerable to session attacks: cookie poisoning attacks the following categories,
except?
User enumeration
Modify the cookie content
Rewrite the session data
Inject the malicious content
Abuse cases lay the foundation for threat modelling during design phas
True
False
HIPPA, GDPR and SOX are examples of functional security requirement
True
False
To mitigate Server-Side Request Forgery (SSRF) web attacks, following bes are used
except?
-Use of safe APIs
-least privilege principle
-Use of anti-tamper techniques
-Input validation
Which of the following are security misconfigurations, which lead to a vari potential
vulnerabilities, except?
-Use of XML files
- Unpatched vulnerabilities
- Unprotected files and directories
-Dafault configuration
Identify the most relevant security practice crucial to address the abuse "Attempted
injection attacks" in the use case of "Input validation"?
-Enforcing strong password policies
-Conducting regular security audits
- Implementing input validation and sanitization
-encryption sensitive user inputs