Podcast
Questions and Answers
Which of the following techniques is most effective for preventing SQL injection attacks?
Which of the following techniques is most effective for preventing SQL injection attacks?
- Using parameterized queries or prepared statements (correct)
- Escaping all user-supplied input
- Implementing strong password policies
- Disabling error messages in production
Cross-Site Scripting (XSS) attacks can only be performed on websites that use JavaScript.
Cross-Site Scripting (XSS) attacks can only be performed on websites that use JavaScript.
False (B)
What is the primary purpose of using a Content Security Policy (CSP)?
What is the primary purpose of using a Content Security Policy (CSP)?
To mitigate Cross-Site Scripting (XSS) attacks by controlling the resources the browser is allowed to load for a specific webpage.
The principle of __________ __________ requires granting users only the minimum levels of access rights needed to perform their job functions.
The principle of __________ __________ requires granting users only the minimum levels of access rights needed to perform their job functions.
Match each security term with its corresponding description:
Match each security term with its corresponding description:
Which of the following is a common method for securing data in transit?
Which of the following is a common method for securing data in transit?
Salting passwords before hashing makes them completely immune to rainbow table attacks.
Salting passwords before hashing makes them completely immune to rainbow table attacks.
Briefly explain what a 'buffer overflow' is and why it's a security risk.
Briefly explain what a 'buffer overflow' is and why it's a security risk.
In the context of web security, __________ is an attack that exploits the trust a website has in a user.
In the context of web security, __________ is an attack that exploits the trust a website has in a user.
Match each secure coding practice with its corresponding benefit:
Match each secure coding practice with its corresponding benefit:
Which of the following is a key benefit of using a Web Application Firewall (WAF)?
Which of the following is a key benefit of using a Web Application Firewall (WAF)?
Using eval()
in JavaScript is generally considered a safe practice for parsing JSON data.
Using eval()
in JavaScript is generally considered a safe practice for parsing JSON data.
Explain what is meant by 'defense in depth' in the context of cybersecurity.
Explain what is meant by 'defense in depth' in the context of cybersecurity.
A __________ attack involves an attacker intercepting communication between two points to eavesdrop or manipulate the data.
A __________ attack involves an attacker intercepting communication between two points to eavesdrop or manipulate the data.
Match the following vulnerabilities with their common mitigation techniques:
Match the following vulnerabilities with their common mitigation techniques:
What is the primary purpose of rate limiting in web application security?
What is the primary purpose of rate limiting in web application security?
It is generally safe to store API keys directly in client-side code (e.g., JavaScript) for easy access.
It is generally safe to store API keys directly in client-side code (e.g., JavaScript) for easy access.
What are security headers, and provide an example of one commonly used security header.
What are security headers, and provide an example of one commonly used security header.
__________ is a security testing technique that involves providing invalid, unexpected, or random data as inputs to a program.
__________ is a security testing technique that involves providing invalid, unexpected, or random data as inputs to a program.
Match each authentication method with its characteristic:
Match each authentication method with its characteristic:
Flashcards are hidden until you start studying