Description of Business in Business Architecture should address
Business goals, Objectives, Organization structure and functions
Business goals, Objectives, Architecture principles
Business goals, Objectives, Strategic drivers
None of the above
What are the most important steps you would recommend for securing a Web application?
Make sure Input Validation is enforced within the code - Security QA testing
Implement software security policy
Remove or protect hidden files and directories
1 and 2
all
Main aim of XSS attach is given below
XSS attacks typically directly target the web server
XSS attacks typically directly target the web application
XSS attacks typically directly target the user
All
Prequisite for CSRF attach is as below
Attacker must aware of target website
vicktim must logged in the target website
victim must be tricked executing unwanted actions on a web application in which he/she is currently authenticated.
Website must be vulnerable to XSS
1,2,3
ALL
which is true about CSRF
CSRF attacks are also known as "Sea Surf",
CSRF attacks are also known as Session Riding,
CSRF attacks are also known as , Hostile Linking.
CSRF attacks are also known as One-Click attack
Is CSRF and Cross-site Scripting the same thing.
yes
no
not a valid question
No Idea
Prevention from CSRF is
Only accepting POST requests
Using a secret cookie
Both
An internet worm that infects Linux based systems is
Butter worm
Cheese worm
Nachia worm
Blaster worm
Welchia worm is also known as
kak worm
email worm
A unix shellscript worm that infects Linux Servers is
tiger worm
lion worm
looksky worm