1.
What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?
Correct Answer
C. SQL Injection
Explanation
SQL Injection is the correct answer because it is a technique used to exploit web sites by altering backend database queries through inputting manipulated queries. In SQL Injection, an attacker inserts malicious SQL code into input fields, which is then executed by the application's database. This allows the attacker to manipulate the database and potentially gain unauthorized access to sensitive information or perform unauthorized actions on the website.
2.
What happens when an application takes user-inputted data and sends it to a web browser without proper validation and escaping?
Correct Answer
B. Cross Site Scripting
Explanation
When an application takes user-inputted data and sends it to a web browser without proper validation and escaping, it can lead to Cross Site Scripting (XSS) attacks. XSS occurs when an attacker injects malicious code into a website, which is then executed by the victim's browser. This can allow the attacker to steal sensitive information, manipulate website content, or perform other malicious actions. Proper validation and escaping of user-inputted data is essential to prevent XSS vulnerabilities and protect the application and its users.
3.
What flaw arises from session tokens having poor randomness across a range of values?
Correct Answer
D. Session Hijacking
Explanation
The flaw that arises from session tokens having poor randomness across a range of values is Session Hijacking. Session hijacking occurs when an attacker intercepts and steals a user's session token, allowing them to impersonate the user and gain unauthorized access to their account or sensitive information. If session tokens have poor randomness, it becomes easier for attackers to guess or predict these tokens, increasing the likelihood of successful session hijacking attacks.
4.
An attack technique that forces a user’s session credential or session ID to an explicit value.
Correct Answer
C. Session Fixation
Explanation
Session fixation is an attack technique where an attacker forces a user's session credential or session ID to an explicit value. This is typically done by tricking the user into using a predetermined session ID, which the attacker can then use to gain unauthorized access to the user's session. By fixing the session ID, the attacker can bypass authentication and gain control over the user's session, potentially leading to unauthorized actions or data theft.
5.
An attack technique that forces a user’s session credential or session ID to an explicit value.
Correct Answer
D. Session Fixation
Explanation
Session fixation is an attack technique where an attacker forces a user's session credential or session ID to an explicit value. This can be done by tricking the user into using a predetermined session ID, which allows the attacker to hijack the user's session. Once the attacker has control of the session, they can impersonate the user and perform malicious actions.
6.
What threat arises from not flagging HTTP cookies with tokens as secure?
Correct Answer
A. Session Hijacking
Explanation
Not flagging HTTP cookies with tokens as secure can lead to the threat of session hijacking. Session hijacking refers to an attacker gaining unauthorized access to a user's session by stealing or intercepting their session token. By not flagging cookies as secure, they can be transmitted over insecure channels, making them vulnerable to interception and misuse. This can allow an attacker to impersonate the user and perform actions on their behalf, compromising the security and integrity of the session.
7.
Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites, or redirecting the user to malicious sites?
Correct Answer
B. Cross site scripting
Explanation
Cross-site scripting (XSS) is an attack that allows an attacker to inject malicious scripts into web pages viewed by users. These scripts can then be executed in the user's browser, giving the attacker the ability to hijack user sessions, manipulate website content, or redirect users to malicious sites. XSS attacks are a significant threat to web applications and can lead to various security vulnerabilities if not properly mitigated.
8.
What flaw can lead to exposure of resources or functionality to unintended actors?
Correct Answer
B. Improper Authentication
Explanation
Improper authentication is a flaw that can lead to the exposure of resources or functionality to unintended actors. This means that the system does not properly verify the identity of users before granting them access to certain resources or functionalities. As a result, unauthorized individuals may be able to gain access to sensitive information or perform actions that they should not have the privilege to do. This flaw can be exploited by attackers to compromise the security of the system and potentially cause harm or damage.
9.
Which threat can be prevented by having unique usernames generated with a high degree of entropy?
Correct Answer
D. Authentication bypass
Explanation
Having unique usernames generated with a high degree of entropy can prevent authentication bypass. This is because using unique and complex usernames makes it difficult for attackers to guess or brute force their way into an account. By increasing the entropy, the likelihood of successfully bypassing the authentication system is significantly reduced, enhancing the overall security of the system.
10.
What threat are you vulnerable to if you do not validate the authorization of the user for direct references to restricted resources?
Correct Answer
D. Insecure Direct Object References
Explanation
If you do not validate the authorization of the user for direct references to restricted resources, you are vulnerable to Insecure Direct Object References. This means that an attacker could bypass the intended restrictions and directly access sensitive information or perform unauthorized actions on restricted resources.
11.
Role-Based Access control helps prevent this OWASP Top 10 weakness.
Correct Answer
A. Failure to restrict URL Access
Explanation
Role-Based Access Control (RBAC) is a security mechanism that restricts access to certain resources based on the roles assigned to users. By implementing RBAC, access to URLs can be restricted based on the roles assigned to users, thereby preventing unauthorized access to sensitive information. This helps address the weakness of "Failure to restrict URL Access" as RBAC ensures that only users with the appropriate roles are granted access to specific URLs, reducing the risk of unauthorized access and potential security breaches.
12.
What is the type of flaw that occurs when untrusted user-entered data is sent to the interpreter as part of a query or command?
Correct Answer
B. Injection
Explanation
Injection is the correct answer because it refers to the type of flaw that occurs when untrusted user-entered data is sent to an interpreter as part of a query or command. Injection attacks can happen in various contexts, such as SQL injection, where malicious code is injected into a database query, or command injection, where an attacker injects malicious commands into a system command. These attacks can lead to unauthorized access, data breaches, or system compromise. It is important to sanitize and validate user input to prevent injection vulnerabilities.
13.
For every link or form which invokes state-changing functions with an unpredictable token for each user what attack can be prevented?
Correct Answer
C. Cross Site Request Forgery
Explanation
Cross-Site Request Forgery (CSRF) attack can be prevented by using unpredictable tokens for each user when invoking state-changing functions through links or forms. CSRF attacks occur when an attacker tricks a user's browser into making a malicious request on behalf of the user, without their knowledge or consent. By using unpredictable tokens, it becomes difficult for attackers to forge valid requests as they would not be able to predict the token associated with a particular user session. This helps to prevent unauthorized actions and protect against CSRF attacks.
14.
For a connection that changes from HTTP to HTTPS, what flaw arises if you do not change the session identifier?
Correct Answer
A. Session Replay
Explanation
If a connection changes from HTTP to HTTPS without changing the session identifier, the flaw that arises is session replay. Session replay refers to the act of an attacker intercepting and replaying a session token or identifier to gain unauthorized access to a user's session. In this scenario, if the session identifier remains the same during the transition from HTTP to HTTPS, an attacker can capture the session identifier and use it to replay the session, effectively impersonating the user and gaining unauthorized access to their session.
15.
The attack exploits the trust that a site has in a user's browser.
Correct Answer
B. Cross Site Request Forgery
Explanation
Cross-Site Request Forgery (CSRF) is the correct answer because it involves exploiting the trust between a website and a user's browser. CSRF attacks trick a user's browser into making unintended requests to a website on which the user is authenticated, allowing the attacker to perform actions on behalf of the user without their knowledge or consent. This attack takes advantage of the fact that websites often trust requests coming from a user's browser, making it a dangerous vulnerability that can lead to unauthorized actions being performed.
16.
For an indirect reference, what happens if there’s no list of limited values authorized for a user in the direct reference?
Correct Answer
D. Access to sensitive data possible
Explanation
If there is no list of limited values authorized for a user in the direct reference, it means that there are no restrictions on the data that the user can access. This lack of authorization control can lead to unauthorized access to sensitive data, making it possible for someone to view or manipulate sensitive information without proper permission.
17.
We can allow client-side scripts to execute in the browsers for needed operations.
Correct Answer
B. False
Explanation
Client-side scripts are executed on the user's browser rather than on the server. Allowing client-side scripts to execute in the browser can pose security risks as it gives potential attackers the ability to manipulate and exploit the script. Therefore, it is generally recommended to limit the execution of client-side scripts to only necessary operations and to implement security measures to protect against potential vulnerabilities.
18.
Session related vulnerabilities.
Correct Answer(s)
A. Session Fixation
B. Session Hijacking
Explanation
Session Fixation is a vulnerability where an attacker can fix or set a session identifier for a user before they authenticate. This allows the attacker to hijack the session once the user logs in. Session Hijacking, on the other hand, is when an attacker steals or hijacks an existing session by obtaining the session identifier. Both vulnerabilities involve unauthorized access to a user's session, but session fixation involves setting the session identifier beforehand, while session hijacking involves stealing it after authentication.
19.
What is phishing?
Correct Answer
B. Email Scam
Explanation
Phishing refers to a type of online scam where individuals are tricked into providing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity through fraudulent emails or websites. This fraudulent activity aims to deceive users into believing they are interacting with a legitimate organization, ultimately leading to financial loss or identity theft.
20.
What is a cookie?
Correct Answer
B. A file that makes it easier to access a Web site and browse.
Explanation
A cookie is a file that makes it easier to access a website and browse. When a user visits a website, the website sends a small piece of data (cookie) to the user's browser, which is stored on their device. This cookie contains information about the user's preferences, login credentials, and browsing behavior. The next time the user visits the same website, the browser sends the cookie back to the website, allowing it to remember the user's preferences and provide a personalized browsing experience. Cookies do not have any connection to computer viruses or identity theft.
21.
You receive an e-mail from Desjardins saying that you have won a contest. What should you do?
Correct Answer
B. Contact your caisse to confirm the information.
Explanation
The correct answer is to contact your caisse to confirm the information. This is the most cautious and responsible approach to take when receiving an email claiming that you have won a contest. By reaching out to your caisse, you can verify the legitimacy of the email and ensure that it is not a scam. It is important to confirm the information before providing any personal details or taking any further action.
22.
An IP Address is the Internet equivalent of:
Correct Answer
A. Your mailing address
Explanation
An IP address is similar to a mailing address because it identifies the location of a device connected to the internet. Just as a mailing address is used to send and receive physical mail, an IP address is used to send and receive data packets over the internet. It allows devices to communicate with each other and ensures that data is delivered to the correct destination.
23.
Statistics show that many companies connected to the Internet are not sufficiently secure. Why not?
Correct Answer(s)
A. Many companies do not have a written security policy in place.
C. Many companies have insufficient protection between the Internet and company networks.
D. Many companies have insufficient information about the traffic over the company networks.
Explanation
The statistics mentioned indicate that there are several reasons why many companies connected to the Internet are not sufficiently secure. One reason is that many companies do not have a written security policy in place. This means that they do not have clear guidelines and protocols for ensuring the security of their networks. Another reason is that many companies have insufficient protection between the Internet and their company networks. This means that there are vulnerabilities and weak points in their network infrastructure that can be exploited by attackers. Lastly, many companies have insufficient information about the traffic over their company networks, which means they may not have the necessary visibility and monitoring capabilities to identify and respond to security threats effectively.
24.
The use of proper security techniques can:
Correct Answer(s)
A. Minimize the threat of attackers
C. Prevent most hackers from accessing your system.
Explanation
The use of proper security techniques can minimize the threat of attackers and prevent most hackers from accessing your system. By implementing effective security measures, such as firewalls, encryption, and authentication protocols, the likelihood of successful attacks and unauthorized access is greatly reduced. While it cannot provide 100 percent security, it significantly enhances the overall security posture of the system and acts as a deterrent for potential attackers.
25.
Network permissions should be established so that users can accomplish their tasks, but cannot access any system resources that are not necessary so that:
Correct Answer
C. Only the resources authorized for that user will be at risk.
Explanation
Establishing network permissions ensures that users can only access the system resources that are necessary for them to accomplish their tasks. By limiting their access to only authorized resources, the risk of unauthorized access or misuse of system resources is minimized. This helps prevent hackers from stealing a legitimate user's identity or posing as legitimate users, as they will not have access to resources beyond what they are authorized for. Therefore, the statement that "Only the resources authorized for that user will be at risk" is the correct explanation.
26.
The characteristics of an effective security system are that the system is:
Correct Answer(s)
B. Highly secure, easy to use, flexible, and scalable
C. One that provides comprehensive alarming and reporting
Explanation
An effective security system should be highly secure to protect against unauthorized access. It should also be easy to use so that users can easily navigate and utilize the system without difficulty. Additionally, the system should be flexible and scalable, meaning it can adapt to changing needs and can expand or contract as necessary. Lastly, the system should provide comprehensive alarming and reporting capabilities to alert users of any potential security breaches and to keep track of system activity.