Tag: security

Questions Related to security

  1. Page Scope

  2. Session Scope

  3. Request Scope

  4. Application Scope


Correct Option: B
  1. Depends on how it is used

  2. Stateful protocol

  3. Transport Layer protocol

  4. Stateless protocol


Correct Option: D
  1. It does not matter, the web serve will treat all GET requests as POST requests

  2. The information in a POST request cannot be manipulated. It is possible to change a GET request

  3. A GET request is sent when requesting information; A POST request is sent when sending information

  4. The data is sent in the body of the POST request and in the URL in a GET request


Correct Option: D
  1. Sent to the user in a hidden field so that tech support can retrieve the information later

  2. Destroyed if it occurs to minimize the chances that this information might be inadvertently disclosed

  3. Logged on the server side

  4. A and C


Correct Option: C
  1. WADL, WSDL, SAML

  2. UDDI, WADL, WSDL

  3. SOAP, SAML, WADL

  4. WSDL, SOAP, SAML


Correct Option: D
  1. Accounts for each user

  2. Account for each group of users

  3. Accounts for each business unit

  4. None of the above


Correct Option: A
  1. An administrative interface to an application

  2. When two users access each other's information

  3. A loop hole within an application that allows users to bypass the standard security flow by way of a secret token or identifier

  4. The connection between the application and the database


Correct Option: C
  1. Is a good programming practice

  2. Is very useful during code reviews

  3. Is the recommended practice for secure code maintenance

  4. May give the attacker valuable information to perform an exploit


Correct Option: D