Which Scope contain data specific to a user session?
Page Scope
Session Scope
Request Scope
Application Scope
SOAP is a
Depends on how it is used
Stateful protocol
Transport Layer protocol
Stateless protocol
The difference between a GET and a POST request is
It does not matter, the web serve will treat all GET requests as POST requests
The information in a POST request cannot be manipulated. It is possible to change a GET request
A GET request is sent when requesting information; A POST request is sent when sending information
The data is sent in the body of the POST request and in the URL in a GET request
In order to avoid information disclosure error messages containing stack traces, specific application information should be
Sent to the user in a hidden field so that tech support can retrieve the information later
Destroyed if it occurs to minimize the chances that this information might be inadvertently disclosed
Logged on the server side
A and C
Name 3 of the elements associated with web services
WADL, WSDL, SAML
UDDI, WADL, WSDL
SOAP, SAML, WADL
WSDL, SOAP, SAML
Which form of accountability should be used
Accounts for each user
Account for each group of users
Accounts for each business unit
None of the above
What is a back door?
An administrative interface to an application
When two users access each other's information
A loop hole within an application that allows users to bypass the standard security flow by way of a secret token or identifier
The connection between the application and the database
Hardcoded credentials in the source code which are checked prior to the normal authentication process is an example of which of the following
A backdoor
An access control vulnerability
A buffer over flow
A SQL injection vulnerability
What is suggested as the leading practice for the maximum length of time before users are forced to change their passwords?
60 days
180 days
120 days
90 days
Leaving comments in HTML source code when an application leaves the development environment
Is a good programming practice
Is very useful during code reviews
Is the recommended practice for secure code maintenance
May give the attacker valuable information to perform an exploit