Secure Coding & Testing | Test-4

0%
0

Secure Coding & Testing | Test-4

In this section, we delve into the principles and practices of secure coding and rigorous testing methodologies designed to fortify software against vulnerabilities. We cover strategies for writing code that adheres to security best practices, including input validation, proper error handling, and secure authentication mechanisms. Additionally, we explore various testing techniques such as static analysis, dynamic testing, and penetration testing to identify and mitigate potential security threats. By integrating secure coding practices with comprehensive testing, this section aims to ensure robust, resilient software that safeguards against potential attacks and maintains the integrity of sensitive data.

1 / 23

1. A tester discovers that the web application under examination is susceptible to Cross Site Scripting (XSS) during a penetration test. Which of the following needs to be true in order to take advantage of this vulnerability?

2 / 23

2. Vulnerability scans are PRIMARILY used to:

3 / 23

3. When the software is made to fail as part of security testing, which of the following needs to be ensured the MOST?

Select the BEST response.

4 / 23

4. Think of a business-critical web-application of Antiqz company which sells rare antique items to the customers worldwide. All the developed components are reviewed by the security team periodically. In order to drive business growth, the web-application developers agreed to add some 3rd party marketing tools on it. These tools are written in JavaScript and can track the customer’s activity during purchases/search. These tools are hosted the servers of the marketing company. What is the probable security risk associated with this scenario?

5 / 23

5. Bad coding practices such as improper memory calls and infinite loops pose risks to which of the following?

6 / 23

6. Why is it recommended to execute all input validation on a trusted system (server-side, not client-side) in secure software development?

7 / 23

7. Why is it beneficial to use a centralized input validation routine for the entire application in secure software development?

8 / 23

8. Why is it beneficial to use a centralized input validation routine for the entire application in secure software development?

9 / 23

9. Why is it important to validate data from redirects in a secure web development?

10 / 23

10. Why is it recommended to validate for expected data types using an “allow” list rather than a “deny” list in secure software development?

11 / 23

11. Why is it recommended to use only HTTP POST requests to transmit authentication credentials?

12 / 23

12. Why is it advisable to use the server or frameworkโ€™s session management controls and have the application recognize only these session identifiers as valid?

13 / 23

13. Why is it important for session management controls to use well-vetted algorithms that ensure sufficiently random session identifiers?

14 / 23

14. What is the BEST way among the following to secure cookies containing authenticated session identifiers?

15 / 23

15. What is the BEST practice among the following for session identifiers during logins?

16 / 23

16. Which of the following services is provided by the Open Web Application Security Project (OWASP) testing methodology in order to address the need to secure web applications?

17 / 23

17. Why is it RECOMMENDED to supplement standard session management for highly sensitive or critical operations by utilizing per-request, as opposed to per-session, strong random tokens or parameters?

18 / 23

18. Why is it RECOMMENDED not to disclose sensitive information in error responses, including system details, session identifiers, or account information?

19 / 23

19. What is the BEST practice related to logging in applications among the following?

20 / 23

20. Why is it CRUCIAL to remove test code or any functionality not intended for production prior to deployment?

21 / 23

21. Why is it IMPORTANT to scan user-uploaded files in the application?

22 / 23

22. Why is it important to ensure that the application will only handle business logic flows for the same user in a step-by-step, sequential manner without skipping any steps?

23 / 23

23. Which of the following best describes the difference between generation-based and mutation-based fuzzing?

Your score is

The average score is 0%

0%


Related challenges :