Tag: security

Questions Related to security

  1. SQL Injection

  2. Denial of Service

  3. XML Injection

  4. All of the above


Correct Option: D

Which of the following method would be proper to use when encrypting personal information

  1. XOR'ing with a cryptographically secure random number

  2. Triple DES

  3. DES-CBC 56bits

  4. Salted hash with a cryptographically secure random number


Correct Option: B
  1. Resources to become unavailable to legitimate users

  2. Cross Site Tracing

  3. Server Instability

  4. Both A and B


Correct Option: C
  1. Pure C++

  2. Any file type on a web server

  3. Pure C#

  4. Pure Java


Correct Option: A
  1. Client (Browser)

  2. Database

  3. Web Application

  4. Web Server


Correct Option: A
  1. Compromise of users

  2. Loss of data integrity

  3. Destruction of data

  4. None of the above


Correct Option: A
  1. Web Server configuration files

  2. Application configuration files

  3. Application error handlers

  4. All of the above


Correct Option: D
  1. Java sand box environment provides protection against decompilation

  2. Java is compiled into ELF binaries and cannot be decompiled

  3. Java byte code can always be decompiled, code obfuscators can make the reverse engineering process more time confusing but cannot prevent it

  4. Java is difficult to decompile because the Just-In-Time compiler automatically perform string encryption by default


Correct Option: C