Questionnaire
0
Votes
1
Ans
What is the end result of a XSS attack? Choose two.
916 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the main cause of XSS vulnerabilities?
1.05K viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the first step in a XSS attack?
920 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the first step in a CSRF attack?
986 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the result of CSRF attacks?
996 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Where should developers use randomized tokens to mitigate CSRF attacks?
1.10K viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Why are CSRF attacks difficult to detect?
833 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What role does the HTTP referrer field play in CSRF mitigation?
705 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following do developers use for the OWASP Top 10?
685 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What benefits do developers gain from the OWASP Top 10? Choose any two.
704 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which OWASP Top 10 item relates to validating data input?
726 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which OWASP Top 10 2017 item focuses on trusted application building blocks?
757 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which web application security issue is common in all OWASP Top 10 lists?
686 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
In which year did the OWASP Top 10 begin?
701 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which services are provided through OWASP? Choose any two
659 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the definition of an IT exploit?
687 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which coding technique makes a code hard to read and understand?
743 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are client side web application languages? Choose any two.
651 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Match the descriptions to the type of identifiers they represent.
666 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is SSO in terms of cloud service security?
837 viewsShubham Haldkar Changed status to publish