Tag: security

Questions Related to security

Which of the following are XSS worms?

  1. Samy worm

  2. Bom Sabado

  3. SQL Slammer

  4. Sober worm


Correct Option: A,B
  1. Group based access control should be implemented to assign permissions to application users

  2. Consistent authorization checking should be performed on all application pages

  3. A set of all allowable actions should be defined for each user role and all other's denied

  4. All failed access authorization requests should be logged to a secure location for review by administrators


Correct Option: C

Which of the following is appropriate for customer emails regarding a limited time promotional offer?

  1. Request that the user authenticate him/herself by replying to the email with their account credentials.

  2. Personalized greeting line

  3. Providing easy access to the customer's account via a “Click Here” style link

  4. Sending the email from a domain set up specifically for the special offer


Correct Option: B

Cross Site Scripting is an attack against

  1. Client (Browser)

  2. Database

  3. Web Application

  4. Web Server


Correct Option: A
  1. Compromise of users

  2. Loss of data integrity

  3. Destruction of data

  4. None of the above


Correct Option: A
  1. Data is validated against a list of values that are known to be valid

  2. Data is validated against a list of values that are known to be invalid

  3. Both of the above

  4. None of the above


Correct Option: A