midterm security websites

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

Where should TLS be used?

Everywhere.

2
New cards

Which type of encryption does the TLS protocol use?

Both Symmetric and Asymmetric encryption.

3
New cards

True or False: Symmetric Cryptography uses a public and private key to encrypt data.

False.

4
New cards

What does SSL stand for?

Secure Sockets Layer.

5
New cards

Which header is required to implement HTTP Strict Transport Security (HSTS)?

Strict-Transport-Security.

6
New cards

Which SSL attack signaled the death of SSL 3.0?

POODLE.

7
New cards

What does TLS stand for?

Transport Layer Security.

8
New cards

What does HTTP Strict Transport Security provide to the user?

Forces the browser to only make HTTPS connections to the server.

9
New cards

True or False: One option for certificate pinning is to carry a copy of the server's public key.

True.

10
New cards

What three things does TLS provide to the user?

Integrity, Confidentiality, Authenticity.

11
New cards

Access control decisions should never be made in the following:

JavaScript.

12
New cards

True or False: The principle of least privilege should be applied only to systems that use database authentication, not Windows authentication.

False.

13
New cards

All of the following represent an Access Control Anti-Pattern except:

Centralized access control logic.

14
New cards

True or False: Claim-based access control is more secure than role-based access control.

True.

15
New cards

An attack on private data at the same level or using the same role is which type of access control attack?

Horizontal.

16
New cards

In SQL integrated access control, an AND statement should reference data such as to make a trusted access control decision.

UserID from current session.

17
New cards

True or False: Role-based access control will prevent a horizontal access control attack.

False.

18
New cards

True or False: Having your seat verified at the gate as you board the plane is an example of authorization.

True.

19
New cards

In the airport example, the TSA checkpoint provides which type of control?

Authentication.

20
New cards

True or False: One best practice for access control is to fail open.

False.

21
New cards

What type of query is resilient to SQL Injection?

Parameterized query.

22
New cards

Which SQL Injection impact is difficult to detect and poses the greatest integrity risk to the business?

Data modification.

23
New cards

The parameterized query statement SqlCommand() is used to bind variables in which language?

.NET.

24
New cards

True or False: More privileges can be revoked through the Dynamic SQL DB Query Method than the Stored Procedure DB Query Method.

False.

25
New cards

True or False: Parameterized queries perform data type checking on parameter values and limit the scope of user input.

True.

26
New cards

True or False: String building allows untrusted data to be inserted into a database query.

True.

27
New cards

Injected SQL queries run under the context of which account?

Application Account.

28
New cards

In order to assess current vulnerabilities, the following resources would be used except:

exploit-db.com website.

29
New cards

In addition to implementing the principle of least privilege on the database, what can serve as a checklist to secure the application server?

Implement ASVS controls.

30
New cards

True or False: SQL Injection is the only form of injection attack available to a hacker.

False.

31
New cards

True or False: HTTPS should only be used on web pages that pass username and password information.

False.

32
New cards

What is the best way to discover sample or default functionality of a web server?

Use Burp Intruder and a fuzzing list such as FuzzDB.

33
New cards

True or False: The HttpOnly parameter for the set-cookies header allows the use of client-side JavaScript to send the cookie.

False.

34
New cards

The User-Agent request header provides the following information to the server EXCEPT:

Accepted Encoding type.

35
New cards

True or False: ASCII is designed to convert international writing systems into browser-readable text.

False.

36
New cards

Name a technique, in addition to spider functionality, used to discover hidden web content.

Use of public information.

37
New cards

True or False: HTTPS provides verification of server identity via an X.509 certificate.

True.

38
New cards

Which HTTP response code indicates the issue is with the client request?

404 Not Found.

39
New cards

True or False: Setting the X-Frame-Options header is a defensive setting to prevent Cross-Site Scripting.

True.

40
New cards

Name a tool that can be used to manipulate URL parameters before they are sent back to the website.

Burp.

41
New cards

True or False: Using an intercepting proxy to index a web application produces a site map.

True.

42
New cards

True or False: Per OWASP, the attack vector exploitability rating for Insecure Deserialization is AVERAGE.

False.

43
New cards

True or False: Automated tools contribute to an easy level of exploitability for the Cross-Site Scripting (XSS) vulnerability.

True.

44
New cards

True or False: OWASP is a commercial company focused on application security.

False.

45
New cards

What component is required to use an intercepting proxy successfully when interacting with secure (HTTPS) websites?

X.509 Certificate.

46
New cards

Which intercepting proxy functionality is not available within the Burp Community edition?

Scanner.

47
New cards

Which functionality within Burp produces a site map after it is run?

Spider.

48
New cards

A comprehensive data classification taxonomy represents a core requirement in defending against which vulnerability?

Sensitive Data Exposure.

49
New cards

True or False: Utilizing an intercepting proxy like Burp provides visibility to detailed web application traffic not visible to the end user in the browser.

True.

50
New cards

Extending Burp functionality is possible through extensions. Which extension type is not supported in Burp?

.NET.

51
New cards

True or False: Software security assurance is not practical in an agile development model.

False.

52
New cards

What represents the greatest impact to developer security habits and mindset?

Developers rarely receive formal security training in school or on the job.

53
New cards

True or False: API security can provide access to monitoring and transformation applications through JSON, REST, and SOAP.

True.

54
New cards

Which web application component represents optional functionality in a typical end-to-end solution?

Firewall.

55
New cards

Securing a Host includes the following areas EXCEPT:

Input Validation.

56
New cards

Which challenge represents the greatest security threat to the Internet?

Internet of Things.

57
New cards

Which component is most secure based on proximity to the "trusted" core?

Servers.

58
New cards

True or False: By the year 2020, there will be more devices than people in use worldwide.

True.

59
New cards

True or False: Companies that perform monthly penetration tests should be confident their web applications are secure 24/7.

False.

60
New cards

Which of the following is NOT considered a typical development environment problem?

Platform Vulnerabilities.