<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_Top_10_Threats_and_Mitigations_Exam</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_Top_10_Threats_and_Mitigations_Exam"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam&amp;action=history"/>
		<updated>2026-05-07T13:28:53Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam&amp;diff=102387&amp;oldid=prev</id>
		<title>Jason Taylor at 12:50, 28 January 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam&amp;diff=102387&amp;oldid=prev"/>
				<updated>2011-01-28T12:50:39Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 12:50, 28 January 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l631&quot; &gt;Line 631:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 631:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Use POST parameters. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Use POST parameters. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Set the secure flags in cookies. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Set the secure flags in cookies. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l653&quot; &gt;Line 653:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 649:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# When you are trying to protect against regular expression injection &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# When you are trying to protect against regular expression injection &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# When you need to tell the interpreter that input is data and not code '''(Correct)'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# When you need to tell the interpreter that input is data and not code '''(Correct)'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Jason Taylor</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam&amp;diff=102386&amp;oldid=prev</id>
		<title>Jason Taylor: Created page with '&lt;center&gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&lt;/center&gt;  &lt;center&gt;&lt;/center&gt;  &lt;center&gt;'''Exam Questions'''&lt;/center&gt;      Which of the following can be caused by an…'</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam&amp;diff=102386&amp;oldid=prev"/>
				<updated>2011-01-28T12:49:45Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#039;&amp;lt;center&amp;gt;&amp;#039;&amp;#039;&amp;#039;Course Title: OWASP Top 10 Threats and Mitigation&amp;#039;&amp;#039;&amp;#039;&amp;lt;/center&amp;gt;  &amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;  &amp;lt;center&amp;gt;&amp;#039;&amp;#039;&amp;#039;Exam Questions&amp;#039;&amp;#039;&amp;#039;&amp;lt;/center&amp;gt;      Which of the following can be caused by an…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can be caused by an injection attack? &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Data loss '''(Correct)'''&lt;br /&gt;
# Denial of service '''(Correct)'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat can occur in languages that do not support a clear distinction between code and data? &lt;br /&gt;
&lt;br /&gt;
# Injection '''(Correct)'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios can lead to an injection attack?&lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''(Correct)'''&lt;br /&gt;
# Unvalidated input cannot be distinguished from valid instructions. '''(Correct)'''&lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is your Web application susceptible to if a user can pass specially crafted input that invokes semantic control codes? &lt;br /&gt;
&lt;br /&gt;
# Injection '''(Correct)'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following techniques can be used to protect against injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Input validation '''(Correct)'''&lt;br /&gt;
# Allow list '''(Correct)'''&lt;br /&gt;
# Escaping '''(Correct)'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following components are vulnerable to injection attacks? &lt;br /&gt;
&lt;br /&gt;
# Control constructs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''(Correct)'''&lt;br /&gt;
# SQL queries based on user input '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which control construct can be used to perform an SQL injection attack? &lt;br /&gt;
&lt;br /&gt;
# Single quote (') '''(Correct)'''&lt;br /&gt;
# Null (\0) byte&lt;br /&gt;
# Less than sign(&amp;amp;lt;)&lt;br /&gt;
# Greater than sign(&amp;amp;gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which two mitigation techniques when used in combination can help you strictly define valid input? &lt;br /&gt;
&lt;br /&gt;
# Allow list ('''Correct''')&lt;br /&gt;
# Block list '''(Correct)'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are architecture-level techniques used to prevent attacks based on malicious input? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''(Correct)'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Object class for user input '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation technique helps you tell the parser that a specific character is a literal and not a control character? &lt;br /&gt;
&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Allow list &lt;br /&gt;
# Escaping '''(Correct)'''&lt;br /&gt;
# Block list &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
&lt;br /&gt;
You should use a blacklist wherever possible; use whitelists only as a secondary defense. &lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation technique helps you define disallowed inputs? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Block list '''(Correct)'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is caused by an injection attack into a browser?&lt;br /&gt;
&lt;br /&gt;
# Cross-site scripting '''(Correct)'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Broken authentication and session management &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following languages are the primary targets of cross-site scripting? &lt;br /&gt;
&lt;br /&gt;
# HTML '''(Correct)'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# JavaScript '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which type of attack occurs when a malicious user convinces a victim to send a request containing malicious input to a server? &lt;br /&gt;
&lt;br /&gt;
# Reflected XSS '''(Correct)''' &lt;br /&gt;
# Persistent XSS &lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do to prevent a DOM-based XSS attack? &lt;br /&gt;
&lt;br /&gt;
# Set the HttpOnly flag in cookies &lt;br /&gt;
# Ensure that session IDs are not exposed in a URL &lt;br /&gt;
# Ensure that a different nonce is created for each request &lt;br /&gt;
# Validate any input that comes from another Web site '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How does malicious input flow in a DOM-based XSS? &lt;br /&gt;
&lt;br /&gt;
# From server to client&lt;br /&gt;
# From client to itself '''(Correct)'''&lt;br /&gt;
# From attacker to server (M1_T3_P3)&lt;br /&gt;
# From victim to server (M1_T3_P2)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following techniques should you use to prevent malicious input?&lt;br /&gt;
&lt;br /&gt;
# Allow List '''(Correct)'''&lt;br /&gt;
# Block list''' (Correct)'''&lt;br /&gt;
# Escaping '''(Correct)'''&lt;br /&gt;
# Encryption &lt;br /&gt;
# Table indirection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set the HttpOnly flag in a cookie to ensure that: &lt;br /&gt;
&lt;br /&gt;
# The cookie is not available to client scripts '''(Correct)'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser&lt;br /&gt;
# The cookie is sent over an encrypted channel &lt;br /&gt;
# The cookie is a persistent cookie&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set a secure flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
# The cookie is not available to client script. &lt;br /&gt;
# The cookie is sent over an encrypted channel. '''(Correct)'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which type of attack occurs when an attacker submits data to the server and the data is stored on the server? &lt;br /&gt;
&lt;br /&gt;
# DOM-based XSS &lt;br /&gt;
# Reflected XSS &lt;br /&gt;
# Persistent XSS '''(Correct)'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following input sources can be controlled by a malicious user? &lt;br /&gt;
&lt;br /&gt;
# &amp;lt;nowiki&amp;gt;Window.lo&amp;lt;/nowiki&amp;gt;cation '''(Correct)'''&lt;br /&gt;
# GET/POST parameters '''(Correct)'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports and network resources &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios may result in broken authentication and session management vulnerabilities? &lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''(Correct)'''&lt;br /&gt;
# Misconfigured off-the-shelf code''' '''is used.''' (Correct)'''&lt;br /&gt;
# Unvalidated input cannot be distinguished from valid instructions. &lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take before implementing a custom authentication and session management system?&lt;br /&gt;
&lt;br /&gt;
# Find out if a suitable framework component already exists. '''(Correct)'''&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''(Correct)'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False. &lt;br /&gt;
&lt;br /&gt;
When implementing an authentication or session system, you should ensure that new session IDs are not created at login.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False ('''Correct''')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following functionalities should you include in an authentication and session management system?&lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''(Correct)''' &lt;br /&gt;
# Inactivity timeout functionality '''(Correct)'''&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Why should you use CAPTCHA? &lt;br /&gt;
&lt;br /&gt;
# To create cryptographically random session IDs &lt;br /&gt;
# To protect credentials  by using encryption or cryptographic salt and hash &lt;br /&gt;
# To protect authentication systems from automated or brute-force attacks '''(Correct)'''&lt;br /&gt;
# To ensure that authentication systems implement inactivity timeout functionality &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do before passing credentials over the network? &lt;br /&gt;
&lt;br /&gt;
# Replace the credentials with a cryptographic salt and hash ('''Correct''')&lt;br /&gt;
# Accept session IDs from URLs &lt;br /&gt;
# Share the credentials with the client. &lt;br /&gt;
# Use persistent cookies to manage session IDs. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which location should you ideally use to store a session ID?&lt;br /&gt;
&lt;br /&gt;
# URLs &lt;br /&gt;
# Form variables&lt;br /&gt;
# Persistent cookies &lt;br /&gt;
# Non-persistent cookies '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do to ensure that JavaScript cannot be used to access a cookie?&lt;br /&gt;
&lt;br /&gt;
# Set the secure flag in the cookie &lt;br /&gt;
# Set the HttpOnly flag in the cookie '''(Correct)'''&lt;br /&gt;
# Use the CAPTCHA system&lt;br /&gt;
# Use non-persistent cookies &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are authentication system mandatory requirements?&lt;br /&gt;
&lt;br /&gt;
# Strong passwords are required. '''(Correct)'''&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity are required.''' (Correct)'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
# Credentials are always protected with encryption or cryptographic salting and hashing. '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are requirements for an authentication token? &lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site &lt;br /&gt;
# It should be used as a replacement for a user's credentials '''(Correct)'''&lt;br /&gt;
# It should always use a persistent cookie &lt;br /&gt;
# It should always use a non-persistent cookie '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False. &lt;br /&gt;
&lt;br /&gt;
An identification token is a replacement for a user’s credentials and should allow access to restricted resources of a Web site. &lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following tasks are performed by a session-based system? &lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''(Correct)'''&lt;br /&gt;
# Providing access to restricted resources '''(Correct)'''&lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat can occur when a Web application fails to validate a client's access to a resource?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Insecure direct object reference '''(Correct)'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following objects are susceptible to an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Files '''(Correct)'''&lt;br /&gt;
# Registry keys '''(Correct)'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following vulnerabilities may be caused by an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Modifying data without authorization. '''(Correct)'''&lt;br /&gt;
# Accessing a resource without authorization. '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do to mitigate the threat of an insecure direct object reference attack?&lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''(Correct)'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Perform an access check each time a resource identifier arrives as input. '''(Correct)'''&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
&lt;br /&gt;
Time of Check Time of Use (TOCTOU) occurs if the authorization check is performed on one page of a Web site and the resource is used on a different page.&lt;br /&gt;
&lt;br /&gt;
# True '''(Correct)'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your Web application stores information about many accounts. Which threat is your Web application susceptible to if you can manipulate the URL of an account page to access all accounts? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Insecure direct object reference '''(Correct)'''&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Injection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following threats are caused by poor input validation?&lt;br /&gt;
&lt;br /&gt;
# Injection '''(Correct)'''&lt;br /&gt;
# Cross-site scripting '''(Correct)'''&lt;br /&gt;
# Insecure direct object reference '''(Correct)''' &lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat can occur when a POST parameter performs an operation on behalf of a user without checking a shared secret?&lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery '''(Correct)'''&lt;br /&gt;
# Insecure direct object reference &lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Injection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the results of a cross-site request forgery?&lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''(Correct)'''&lt;br /&gt;
# Denial of service '''(Correct)'''&lt;br /&gt;
# Spoofing and tampering '''(Correct)'''&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured or disabled security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following attacks can occur when a malicious user lures victims to malicious content on a Web site?&lt;br /&gt;
&lt;br /&gt;
# Injection &lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site request forgery '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
&lt;br /&gt;
The downside of a nonce is that it needs to be stored on the client.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you add to an HMAC to ensure that the secret value is unique for each request?&lt;br /&gt;
&lt;br /&gt;
# Salt &lt;br /&gt;
# Nonce &lt;br /&gt;
# Session ID &lt;br /&gt;
# Timestamp'''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following practices should you observe in order to implement defense-in-depth techniques against CSRF attacks?&lt;br /&gt;
&lt;br /&gt;
# Use GET parameters&lt;br /&gt;
# Use automatic redirection. &lt;br /&gt;
# Don’t include secrets in the URL. '''(Correct)'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
&lt;br /&gt;
GET parameters limit the types of manipulation a malicious user can perform on the victim to forge a request.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following may cause a security misconfiguration threat?&lt;br /&gt;
&lt;br /&gt;
# Unused services '''(Correct)'''&lt;br /&gt;
# Default accounts '''(Correct)'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to? &lt;br /&gt;
&lt;br /&gt;
# Injection &lt;br /&gt;
# Security misconfiguration '''(Correct)'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to reevaluate your environment and address new threats? &lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments '''(Correct)'''&lt;br /&gt;
# Apply the latest service packs, patches, hotfixes, and updates '''(Correct)''' &lt;br /&gt;
# Use custom cryptographic algorithms &lt;br /&gt;
# Use your browser to forge unauthorized requests&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following procedures are involved in the hardening process? &lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''(Correct)'''&lt;br /&gt;
# Review all settings/configurations. '''(Correct)'''&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequences can occur if your production environment does not match your development, testing, and staging environments? &lt;br /&gt;
&lt;br /&gt;
# Your application may not work. '''(Correct)'''&lt;br /&gt;
# Your application may not perform some authentication checks '''(Correct)'''. &lt;br /&gt;
# Your application may elevate privileges.&lt;br /&gt;
# Your application may deny service. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can cause insecure cryptography?&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''(Correct)'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Failure to rotate keys '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can lead to bad cryptography?&lt;br /&gt;
&lt;br /&gt;
# Custom cryptographic algorithms '''(Correct)'''&lt;br /&gt;
# Insufficient cryptographic protocols '''(Correct)'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following may result in cryptographic weakness?&lt;br /&gt;
&lt;br /&gt;
# Poor/weak algorithm choice '''(Correct)'''&lt;br /&gt;
# Custom cryptographic algorithms '''(Correct)'''&lt;br /&gt;
# Insufficient cryptographic protocols '''(Correct)'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following protocols are network encryption protocols?&lt;br /&gt;
&lt;br /&gt;
# SSL '''(Correct)'''&lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''(Correct)'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following factors help you secure keys? &lt;br /&gt;
&lt;br /&gt;
# Complexity '''(Correct)'''&lt;br /&gt;
# Rotation '''(Correct)'''&lt;br /&gt;
# Randomness '''(Correct)'''&lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following combines public-key cryptography with a cryptographic hash?&lt;br /&gt;
&lt;br /&gt;
# Nonce&lt;br /&gt;
# Digital signature '''(Correct)'''&lt;br /&gt;
# SSL&lt;br /&gt;
# Salt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following depicts the typical impact of failure to restrict URL access?&lt;br /&gt;
&lt;br /&gt;
# Attackers access other users’ accounts and data. '''(Correct)'''&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''(Correct)'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When users log on to your Web site, they are directed to a page with a URL that authorizes them using their role. Which threat is your Web application susceptible to if users can modify their role? &lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Failure to restrict URL access '''(Correct)'''&lt;br /&gt;
# Unvalidated redirects and forwards&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to verify the implementation of your Web application? &lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms &lt;br /&gt;
# Use a simple and positive model at every layer &lt;br /&gt;
# Verify that each URL in your application is protected. '''(Correct)'''&lt;br /&gt;
# Use your browser to forge unauthorized requests '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following should you use to protect the connections between the physical tiers of your application?&lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''(Correct)'''&lt;br /&gt;
# IPSec '''(Correct)'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to implement transport layer protection? &lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL'''(Correct)'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Enable IPSec '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can result from unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Brute force attack &lt;br /&gt;
# Network sniffing &lt;br /&gt;
# Man-in-the-middle attack &lt;br /&gt;
# Bypassed authorization checks '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to protect a Web application from unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header '''(Correct)'''&lt;br /&gt;
# Use extended validation certificates &lt;br /&gt;
# Validate all input from the client '''(Correct)'''&lt;br /&gt;
# Disallow requests to unauthorized file types &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to detect unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Use internal transfers without authorizing the user for target URL &lt;br /&gt;
# Use your browser to forge unauthorized requests&lt;br /&gt;
# Use weblogs to identify redirects and forwards '''(Correct)'''&lt;br /&gt;
# Use policy mechanisms &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do to prevent security issues if a user submits some data to your Web application? &lt;br /&gt;
&lt;br /&gt;
# Validate the data. '''(Correct)'''&lt;br /&gt;
# Use session-based indirection. &lt;br /&gt;
# Use POST parameters. &lt;br /&gt;
# Set the secure flags in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
&lt;br /&gt;
If the input can be confused for instructions in the language or the way the language is applied, then the language is vulnerable to the cross-site request forgery attack. &lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False ('''Correct''')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In which of the following scenarios should you use the escaping technique? &lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''(Correct)'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is data and not code '''(Correct)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do to prevent unvalidated redirect and forwards vulnerabilities? &lt;br /&gt;
&lt;br /&gt;
# Use table indirection '''(Correct)'''&lt;br /&gt;
# Use an allow list&lt;br /&gt;
# Allow only relative redirects '''(Correct)'''&lt;br /&gt;
# Use session-based indirection&lt;/div&gt;</summary>
		<author><name>Jason Taylor</name></author>	</entry>

	</feed>