Tag: technology

Questions Related to technology

What should I log from within my application?

  1. Login and logout of users, Critical transactions (eg. fund transfer across accounts), Failed login attempts, Account lockouts, Violation of policies

  2. Login and logout of users, Critical transactions (eg. fund transfer across accounts), Failed login attempts, Account lockouts, Violation of policies, Forgot password correct and wrong credentials

  3. Login and logout of users, Critical transactions (eg. fund transfer across accounts), Failed login attempts, Account lockouts, Violation of policies, password sharing logs

  4. Login and logout of users, Critical transactions (eg. fund transfer across accounts), Failed login attempts, Account lockouts, Violation of policies, password sharing logs, race condition logs


Correct Option: B

Standard Psuedo Random Number Generator (PRNG) cannot withstand cryptographic attacks.Which of the following type of PRNG would be the most secure to use for random number generation?

  1. Statistical

  2. Cryptographic

  3. None of the above

  4. Both of the above


Correct Option: B
  1. Blind SQL Injection

  2. Cross Side Scripting

  3. Remote File Inclusion

  4. Cross Site Request Forgery


Correct Option: B
  1. DOM

  2. Persistent

  3. Reflected

  4. Inflicted


Correct Option: D

You have been asked to design an auctioning website.Each bidder is provded a unique login and password.Three invalid login attempts would cause the id to be logged out and any active session to be terminated.Which of the following would you avoid to prevent business logic flaws ?

  1. Prevent bidders from seing the bid amount by another bidders

  2. Allow bidders to see the login ID of other bidders

  3. Prevent a bidder from bidding more than thrice

  4. Set a cut off amount on the bids to be raised


Correct Option: B
  1. OpenID

  2. OAuth2.0

  3. LiveID

  4. Advanced Encryption Standard


Correct Option: B

Pick the odd man out

  1. Burp Suite

  2. Paros

  3. Web Scarab

  4. WireShark


Correct Option: D