Question Bank

1899 approved questions from the community

Why should application accounts not have DBA or admin access to database servers?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

Black Box security testing provides testers with full information about the system being tested.

MEDIUM
TRUE FALSE
25s
Web Security
by Mohamed

HTTPS is always slower than HTTP due to encryption overhead.

MEDIUM
TRUE FALSE
25s
Web Security
by Mohamed

What security threat arises from not flagging HTTP cookies with tokens as secure?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

XSS can be completely prevented without modifying source code by using a Web Application Firewall (WAF).

MEDIUM
TRUE FALSE
30s
Web Security
by Mohamed

What is the primary purpose of anti-CSRF tokens?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What information can attackers steal using XSS?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What is the best approach for input validation to prevent security vulnerabilities?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

SSL (Secure Sockets Layer) is still the recommended protocol for secure web communications.

MEDIUM
TRUE FALSE
25s
Web Security
by Mohamed

XSS attacks can only steal cookies; they cannot perform other malicious actions.

MEDIUM
TRUE FALSE
25s
Web Security
by Mohamed

Escaping user input is sufficient to prevent all XSS attacks.

MEDIUM
TRUE FALSE
30s
Web Security
by Mohamed

What is the primary countermeasure for network-level session hijacking?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What is the primary purpose of the Root SSL Certificate?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What security issue arises from session tokens having poor randomness?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What is the primary benefit of implementing Content Security Policy (CSP)?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What does the Access-Control-Allow-Origin header do?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What is the main difference between IDS and a firewall?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What is Cross-Site Request Forgery (CSRF)?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What is ClickJacking?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed

What is a Honeypot in security?

MEDIUM
SINGLE CHOICE
35s
Web Security
by Mohamed
PreviousPage 53 of 95Next