Tag: security

Questions Related to security

  1. Sent to the user in a hidden field so that tech support can retrieve the information later

  2. Destroyed if it occurs to minimize the chances that this information might be inadvertently disclosed

  3. Logged on the server side

  4. A and C


Correct Option: C
  1. WADL, WSDL, SAML

  2. UDDI, WADL, WSDL

  3. SOAP, SAML, WADL

  4. WSDL, SOAP, SAML


Correct Option: D
  1. Accounts for each user

  2. Account for each group of users

  3. Accounts for each business unit

  4. None of the above


Correct Option: A
  1. An administrative interface to an application

  2. When two users access each other's information

  3. A loop hole within an application that allows users to bypass the standard security flow by way of a secret token or identifier

  4. The connection between the application and the database


Correct Option: C
  1. Is a good programming practice

  2. Is very useful during code reviews

  3. Is the recommended practice for secure code maintenance

  4. May give the attacker valuable information to perform an exploit


Correct Option: D
  1. Servers are generally configured in a secure manner when they are first installed

  2. It is impossible to securely configure a web server

  3. Out of the box settings normally meet what is called minimum baseline security standards

  4. The default settings on web servers are not generally secure


Correct Option: D
  1. Filtering data with a default deny regular expression

  2. Running the application with the least privilege necessary

  3. Client side data validation

  4. Retrieving data from database using pre-compiled stored procedures


Correct Option: C
  1. The web server is not patched

  2. The attack entices a user to perform a certain action

  3. Users do not patch their machines

  4. Users share email accounts


Correct Option: B