Question Bank

721 approved questions from the community

Which of the following are important attributes of effective security testing? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Web Security
by Mohamed

Which of the following encryption types are used in SSL/TLS? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Web Security
by Mohamed

Which of the following are types of XSS attacks? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Web Security
by Mohamed

What is a Bug Bounty program?

HARD
SINGLE CHOICE
35s
Web Security
by Mohamed

How can Content Security Policy (CSP) be used against clickjacking?

HARD
SINGLE CHOICE
45s
Web Security
by Mohamed

What is the basic design principle of OWASP ESAPI?

HARD
SINGLE CHOICE
45s
Web Security
by Mohamed

How do you check if HSTS is enabled on a website?

HARD
SINGLE CHOICE
40s
Web Security
by Mohamed

Penetration testing and vulnerability scanning are essentially the same type of security testing.

HARD
TRUE FALSE
30s
Web Security
by Mohamed

Having unique usernames produced with high entropy can prevent session hijacking attacks.

HARD
TRUE FALSE
30s
Web Security
by Mohamed

A valid SSL certificate from a trusted CA guarantees that a website is completely secure and trustworthy.

HARD
TRUE FALSE
30s
Web Security
by Mohamed

Which of the following are components of the SSL/TLS encryption process? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Web Security
by Mohamed

Which of the following are elements of Public Key Infrastructure (PKI)? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Web Security
by Mohamed

What is HSTS (HTTP Strict Transport Security)?

HARD
SINGLE CHOICE
40s
Web Security
by Mohamed

What is Stored XSS?

HARD
SINGLE CHOICE
40s
Web Security
by Mohamed

What is Reflected XSS?

HARD
SINGLE CHOICE
40s
Web Security
by Mohamed

What is Cross Site Tracing (XST)?

HARD
SINGLE CHOICE
45s
Web Security
by Mohamed

What are X-Frame-Options?

HARD
SINGLE CHOICE
40s
Web Security
by Mohamed

How does SSL/TLS handshake work?

HARD
SINGLE CHOICE
50s
Web Security
by Mohamed

How can you mitigate the risk of Weak Authentication and Session Management?

HARD
SINGLE CHOICE
45s
Web Security
by Mohamed

How can you prevent breaches due to Failure to Restrict URL Access?

HARD
SINGLE CHOICE
45s
Web Security
by Mohamed
PreviousPage 24 of 37Next