Questionnaire
0
Votes
1
Ans
Why are CSRF attacks difficult to detect?
608 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What role does the HTTP referrer field play in CSRF mitigation?
515 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following do developers use for the OWASP Top 10?
487 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What benefits do developers gain from the OWASP Top 10? Choose any two.
480 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which OWASP Top 10 item relates to validating data input?
505 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which OWASP Top 10 2017 item focuses on trusted application building blocks?
518 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which web application security issue is common in all OWASP Top 10 lists?
487 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
In which year did the OWASP Top 10 begin?
488 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which services are provided through OWASP? Choose any two
476 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the definition of an IT exploit?
465 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which coding technique makes a code hard to read and understand?
509 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are client side web application languages? Choose any two.
465 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Match the descriptions to the type of identifiers they represent.
507 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is SSO in terms of cloud service security?
561 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the function of a federated identity?
519 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which are the supporting solutions related to the application virtualization?
588 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which are the message protection deployment modes?
660 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which are the external application-oriented devices that provide application security?
651 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Match the descriptions to the security testing techniques that they describe.
498 viewsShubham Haldkar Changed status to publish