0 of 20 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Which of the following is the best way to prevent malicious input from exploiting an application?
Which of the following are some of the ways to protect against injection attacks?
Which of the following is a best practice for securely storing passwords in a web application database?
What is the recommended method to protect against Cross-Site Scripting (XSS) attacks?
Which of the following is/are (a) mitigation technique(s) for Broken Authentication?
Insufficient logging and monitoring can lead to which of the following?
During a vulnerability scan, you identify an XSS (Cross-Site Scripting) vulnerability in a user input form. The form allows users to enter a product review. Which of the following approaches would effectively mitigate this vulnerability?
A web application stores sensitive user data such as credit card information. Which of the following encryption methods is most suitable for protecting this data at rest?
What is the primary purpose of the HTTPOnly flag in cookies?
The HttpOnly flag in a cookie should be set to ensure that:
A web application allows users to upload profile pictures. To prevent file upload vulnerabilities, which of the following configurations on the server-side is most important?
You should use a blacklist wherever possible. Only use whitelists as a secondary defense
Which of the following sources can be directly controlled by a malicious user?
CAPTCHA
Which of the following functionalities should be included in an authentication and session management system?
Which configuration file is commonly used to set server-wide security policies in Apache?
During an API security audit, you discover that sensitive data is being exposed in the URL. Which of the following measures is the most effective to mitigate this issue?
To protect against Denial of Service (DoS) attacks, what is the most effective method for securing an API?
Drag the HTTP Methods to their appropriate description
Requests data from a specified resource.
|
|
Submits data to a specified resource.
|
|
Updates an existing resource with new data.
|
|
Removes the specified resource.
|
|
Drag each JavaScript library to its core feature
Set HTTP Response Headers
|
|
Build User Interfaces
|
|
Responsive Sites
|
|
Data Visualizations
|
|
Interactive Maps
|
|