InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Through a successful format-string attack against a web application, an attacker is able to execute which of the followi |
|
Answer» Through a SUCCESSFUL format-string attack against a web application, an attacker is able to EXECUTE which of the following actions? |
|
| 2. |
Which of the following is not an authorization type? |
|
Answer» Which of the FOLLOWING is not an authorization type? |
|
| 3. |
Which of the following are secure programming guidelines? |
|
Answer» Which of the FOLLOWING are secure programming GUIDELINES? |
|
| 4. |
Which of the following is a security advantage of managed code over unmanaged code? |
|
Answer» Which of the following is a SECURITY advantage of managed code over unmanaged code? |
|
| 5. |
Identify the correct statement in the following in secure programming questions: |
|
Answer» Identify the correct statement in the following in secure programming questions Answers |
|
| 6. |
Identify the correct statement in the following in secure programming |
|
Answer» IDENTIFY the correct statement in the following in secure programming Choose the correct option from below LIST (1)A) and B) (2)None of the above options (3)BANNED or deprecated versions of APIs must not be used.(4)Prepared statements can prevent SQL injection attacks. Answer:-(1)A) and B) |
|
| 7. |
Temporarily files created by applications can expose confidential data if |
|
Answer» Temporarily FILES created by applications can EXPOSE confidential data if |
|
| 8. |
It is a good programming practice to prevent caching of sensitive data at client or proxies, by implementing which of the following? |
|
Answer» It is a GOOD programming practice to prevent caching of sensitive DATA at client or proxies, by implementing which of the following? |
|
| 9. |
Which of the following algorithm/encryption method is the |
|
Answer» Which of the following algorithm/encryption method is the SAFEST to use? |
|
| 10. |
One of the main disadvantages of integrating cryptography into applications is: |
|
Answer» One of the main disadvantages of integrating CRYPTOGRAPHY into applications is: |
|
| 11. |
To improve the overall quality of web applications, developers should abide by which of the following rules? |
|
Answer» To improve the overall quality of web applications, developers should abide by which of the following rules? |
|
| 12. |
Identify the correct statement in the following in secure programming questions |
|
Answer» Identify the CORRECT statement in the following in secure programming questions |
|
| 13. |
Which of the following is not recommended to secure web applications against authenticated users? |
|
Answer» Which of the following is not recommended to secure WEB applications against authenticated USERS? |
|
| 14. |
From application security perspective, why should a CAPTCHA be used in a web application? |
|
Answer» From application security perspective, why should a CAPTCHA be USED in a web application? |
|
| 15. |
Which of the following is the best approach to use when providing access to an SSO application in a portal? |
|
Answer» Which of the following is the best approach to USE when providing access to an SSO APPLICATION in a portal? |
|
| 16. |
Which of the following is true about improper error handling? |
|
Answer» Which of the following is true about improper ERROR handling? |
|
| 17. |
Security check can be enforced at compile time by: |
|
Answer» Security check can be enforced at COMPILE time by: |
|
| 18. |
Securing a database application with username/password access control should be considered sufficient: |
|
Answer» Securing a database application with username/password access control should be considered sufficient: |
|
| 19. |
Proprietary protocols and data formats are: |
|
Answer» Proprietary protocols and data FORMATS are: |
|
| 20. |
Which of the following is not an appropriate method to make an authentication mechanism secure? |
|
Answer» Which of the following is not an APPROPRIATE method to make an authentication mechanism secure? |
|
| 21. |
Which of the following is not an authentication method? |
|
Answer» Which of the FOLLOWING is not an authentication method? |
|
| 22. |
If an attacker submits multiple input parameters (query string, post data, cookies, etc) of the same name, the application may react in unexpected way |
|
Answer» If an attacker submits MULTIPLE input parameters (query STRING, post data, cookies, etc) of the same name, the application may react in unexpected ways and open up NEW avenues of server-side and client-side exploitation. This is the premise of which of the following? |
|
| 23. |
Setting the cookie flag to which of the following mode is a good programming practice? |
|
Answer» SETTING the COOKIE flag to which of the following mode is a good programming PRACTICE? Choose the correct option from below list (1)SAFE (2)Secure (3)Protected (4)Locked Answer:-(2)Secure |
|
| 24. |
Authentication and session management are security concerns of which of the following programming languages? |
|
Answer» AUTHENTICATION and SESSION management are security concerns of which of the following PROGRAMMING languages? Choose the correct option from below list (1)PHP (2)Java (3)C (4).NET (5)All the above OPTIONS Answer:-(5)All the above options |
|
| 25. |
Secure practices for access control include which of the following? |
|
Answer» SECURE practices for access control INCLUDE which of the FOLLOWING? CHOOSE the correct option from below list (1)Role-based access (2)Business workflow (3)Authorization on each request (4)All the above options Answer:-(4)All the above options |
|
| 26. |
There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the f |
|
Answer» There are VARIOUS HTTP authentication MECHANISMS to authenticate a user. LOGIN credentials are sent to the web server in clear text, in which of the following authentication scheme? |
|
| 27. |
What is the purpose of Audit Trail and Logging? |
|
Answer» What is the purpose of AUDIT Trail and LOGGING? |
|
| 28. |
On logout, how should an application deal with session cookies? |
|
Answer» On logout, how should an APPLICATION deal with session cookies? |
|
| 29. |
A race condition in a web server can cause which of the following? |
|
Answer» A race CONDITION in a web server can cause which of the following? |
|
| 30. |
When valuable information has to be transmitted as part of a client request, which of the following mode should be used? |
|
Answer» When valuable information has to be TRANSMITTED as PART of a client request, which of the following mode should be used? |
|