Web application security - the fast guide 1.1 | Page 25

Chapter 1 - information Security overview P a g e | 25
a . Set of privileges . b . Set of groups c . Set of users d . Set of credentials ( user names , passwords )
9 . When handling input according to black list approach we : a . Grant only valid patterns . b . Reject only malicious patterns c . Allow user with right credentials ( user name , password ). d . All the above .
10 . The following input rules list Deny all ; Accept integer numbers ; Accept negative numbers ;
Is applying : a . Black list approach
b . White list approach c . Sanitization approach d . All the above
11 . Which of the following operation is a sanitization operation ? a . “ Noting that x < y in this equation ” is converted to “ Noting that x & lt ; y in this equation ” b . “ The moon looks shiny today .”
Is converted to “/ The / moon / looks / shiny / today ” c . Goto google < script > location (‘ http :// google . com ’);</ script > converted to Goto google < script > location (/‘ http :// google . com ’);</ script d . None of the above 12 . In input handling : a . It is enough to have the sent input of the right type and with no special characters . b . It is enough to have each request checked separately to assure of no malicious activity . c . It is enough to sanitize once the request content to be sure that no attack will take place . d . None of the above
Answers key
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
d
c
d
d
c
b
d
a
b
b
d
d