Security Quiz

A high-tech, futuristic digital landscape showing locks, code, and computer screens, symbolizing web security and vulnerability testing.

Web Security Challenge

Test your knowledge of web security concepts and defenses with our engaging quiz. Uncover the principles of protecting applications against common vulnerabilities such as XSS, SQL Injection, and more.

  • 11 informative questions
  • Multiple choice and checkbox formats
  • Score your security savvy!
11 Questions3 MinutesCreated by GuardingData42
How does XSS attack work?
XSS attacks target functionality that causes a state change on the server, such as changing the victim's email address or password, or purchasing some
A web application is sent with a malicious script that runs when it is read by an unsuspecting user's browser or by an application
An attacker can control the third-party service URL to which the web application makes a request
An attacker can control the third-party service URL to which the web application makes a request
XSS
CSRF
SSRF
What is SQL Injection
It is used to inject malicious code to a database server, through a query
It is used to spoof or inject false headers in a HTTP request
It is used in Buffer Overflow attacks to overwrite memory
What is best practice in defending against SQL injection?
Sanitizing users input in a web application
Programmers will not make web applications that allow user input
Blocking specific ports that SQL injections are usually attacked via
Using the same strong password, with high entropy, on multiple sites is good practice
True. Storing passwords in clear text in database is no longer practiced and are now only using strong encryption
False. If one site is breached/hacked and stores passwords in clear text, your password is now in hackers hands
Choose the insecure design vulnerabilities
Unprotected storage of Credentials
Generation of Error Messages Containing sensitive information
Improper isolation or compartmentalization
Answer 'A' , 'B' and 'C'
For which input validation needs are regular expressions not enough?
File upload input
Validating untrusted JSON
HTML Sanitization
Validating a username
Validating a user's age
Which JavaScript functions are so dangerous that they will automatically execute untrusted data as JavaScript code?
Alert()
InnerHTML()
SetTimeout()
All of the above
What is the best design for input validation?
Detecting attacks and rejecting them.
Setting a policy for good input and rejecting everything else.
Setting a policy for bad input and logging them.
None of the above
Which is not the way to prevent SSRF attack
If your application displays or processes data received from other servers, you must ensure that the response you received is in an expected format. You should never send the raw response body to the client.
You should whitelist the hostnames (DNS names) or IP addresses that your application needs to access.
'A' and 'B'
Which of these will leads to logging and monitoring failures
Auditable events, such as logins, failed logins, and high-value transactions, are not logged.
Appropriate alerting thresholds and response escalation processes are not in place or effective.
The application cannot detect, escalate, or alert for active attacks in real-time or near real-time.
Logs of applications and APIs are not monitored for suspicious activity.
Ensure log data is encoded correctly to prevent injections or attacks on the logging or monitoring systems.
{"name":"Security Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of web security concepts and defenses with our engaging quiz. Uncover the principles of protecting applications against common vulnerabilities such as XSS, SQL Injection, and more.11 informative questionsMultiple choice and checkbox formatsScore your security savvy!","img":"https:/images/course4.png"}
Make your own Survey
- it's free to start.