Application Security

Question 1
Marks : +2 | -2
Pass Ratio : 100%
The system where two independent pieces of data are used to identify a user is called as ______
Two system authentication
ID password authentication
Two factor authentication
Multi data authentication
Explanation:
The system where two independent pieces of data are used to identify a user is called as two-factor authentication. The two factors should not share a common vulnerability.
Question 2
Marks : +2 | -2
Pass Ratio : 100%
The URL of the page that had the link that the user clicked to access the page is called as _____
Source
Linker
Leaker
Referrer
Explanation:
The URL of the page that had the link that the user clicked to access the page is called as referrer. The HTTP protocol allows the server to check the referrer.
Question 3
Marks : +2 | -2
Pass Ratio : 100%
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________
SQL attacks
SQL injection attacks
SQL usage attack
SQL destroyer attack
Explanation:
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as SQL injection attacks.
Question 4
Marks : +2 | -2
Pass Ratio : 100%
A log of all changes to the application data is called as __________
Audit trail
Audit log
Audit lead
Data log
Explanation:
A log of all changes to the application data is called as audit trail. This helps us maintain security as it tracks all the breaches on the system.
Question 5
Marks : +2 | -2
Pass Ratio : 100%
What is the standard for exchanging authentication and authorization information between two different security domains?
SABM
STML
SPTA
SAML
Explanation:
SAML (Security assertion Markup Language) is the standard for exchanging authentication and authorization information between two different security domains. This provides a cross-organization sign-on.
Question 6
Marks : +2 | -2
Pass Ratio : 100%
What are man in the middle attacks?
Users are forced to use a second server which causes the attack
Users are forced to divert to a fake site where the attack takes place
Users are fooled by similar GUI and data is extracted from them.
None of the mentioned
Explanation:
Man in the middle attacks are those attacks in which the users are forced to divert to a fake site where the attack takes place. The fake site is then used to obtain the data from the user.
Question 7
Marks : +2 | -2
Pass Ratio : 100%
Which of the following is a valid encryption technique?
Parallel key encryption
Public key encryption
Systematic key encryption
All of the mentioned
Explanation:
Out of the given options, only public key encryption is a valid approach to an encryption technique. In this, there are two different keys to encrypt the data.
Question 8
Marks : +2 | -2
Pass Ratio : 100%
What are phishing attacks?
Users are forced to use a second server which causes the attack
Users are forced to divert to a fake site where the attack takes place
Users are fooled by similar GUI and data is extracted from them.
None of the mentioned
Explanation:
Phishing attacks are those attacks in which users are fooled by similar GUI and data is extracted from them. The fake site is then used to obtain the data from the user.
Question 9
Marks : +2 | -2
Pass Ratio : 100%
State true or false: Password leakage is a major security problem
True
False
Explanation:
Password leakage is a major security problem because the leaked password grants access to malicious visitors.
Question 10
Marks : +2 | -2
Pass Ratio : 100%
An attack on a website that stores and displays text to a user is known as ______ attack
SQL attack
XSS attack
XRP attack
None of the mentioned
Explanation:
An attack on a website that stores and displays text to a user is known as XSS attack. It is called as cross site scripting attack.