Question Bank
721 approved questions from the community
Which of the following are important attributes of effective security testing? (Select all that apply)
Which of the following encryption types are used in SSL/TLS? (Select all that apply)
Which of the following are types of XSS attacks? (Select all that apply)
What is a Bug Bounty program?
How can Content Security Policy (CSP) be used against clickjacking?
What is the basic design principle of OWASP ESAPI?
How do you check if HSTS is enabled on a website?
Penetration testing and vulnerability scanning are essentially the same type of security testing.
Having unique usernames produced with high entropy can prevent session hijacking attacks.
A valid SSL certificate from a trusted CA guarantees that a website is completely secure and trustworthy.
Which of the following are components of the SSL/TLS encryption process? (Select all that apply)
Which of the following are elements of Public Key Infrastructure (PKI)? (Select all that apply)
What is HSTS (HTTP Strict Transport Security)?
What is Stored XSS?
What is Reflected XSS?
What is Cross Site Tracing (XST)?
What are X-Frame-Options?
How does SSL/TLS handshake work?
How can you mitigate the risk of Weak Authentication and Session Management?
How can you prevent breaches due to Failure to Restrict URL Access?