Web Application Quizzes & Trivia

A comprehensive database of web application quizzes online, test your knowledge with web application quiz questions. Our online web application trivia quizzes can be adapted to suit your requirements for taking some of the top web application quizzes.

Do you know the difference between software and a web browser? Can you tell the differences between tech-speak and programming languages?  So you are a computer whiz and know all there is to know about web applications. Maybe you work in technology and you create or develop web apps such as databases, interactive mapping software, online retail sales, webmail, online auctions and the likes.

Maybe your diction consists of words like n-tiered, plugin, roll out, SQL, ASP, etc. You also know that Django is not the name of a movie. And you also know that AJAX is not a Dutch football team.  If you can tell the differences between a native app and a web app and a hybrid app, and know everything there is to know about web applications, then roll out and see how well you fare in the application of your knowledge in these quizzes.

Questions: 26  |  Attempts: 665   |  Last updated: Jul 23, 2019
  • Sample Question
    What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?

Basic questions which tests the candidate knowledge on OWASP guidelines.

Questions: 26  |  Attempts: 316   |  Last updated: Mar 9, 2013
  • Sample Question
    What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?

This brief quiz is based on OWASP.org's Top-Ten 2007 Web Vulnerabilities The Top-10 provides a description of, examples for and solutions to the ten most commonly discovered vulnerabilities found in deployed web applications...

Questions: 9  |  Attempts: 226   |  Last updated: Apr 21, 2017
  • Sample Question
    One operation that frequently has cross-site scripting (XSS) vulnerabilities is  (choose exactly 1 answer):

Do you think you know enough about security issues in Web applications? Can you think with the mind of a hacker? Test your knowledge with our interactive quiz! Check how much you know, share the results, and help your...

Questions: 10  |  Attempts: 129   |  Last updated: Feb 27, 2013
  • Sample Question
    A web application implements a SQL operation in the following way (pseudocode): The application uses a MSSQL database running on a different machine from the web server. The database has one user (the built-in administrator account is not used). An attacker could use the following parameters to get extra data from the database's contents:

Questions: 5  |  Attempts: 53   |  Last updated: Feb 22, 2013
  • Sample Question
    The most effective way of protecting against SQL injection is… 

Web Application Questions & Answers

What threat are you vulnerable to if you do not validate authorization of user for direct references to restricted resources?
The correct answer to this question is D, Insecure Direct Object References. These references happen when an application gives direct access to objects. The access is based on an input supplied by a user. This makes attackers get through authorizatio
Which threat can be prevented by having unique usernames generated with a high degree of entropy?
The answer to this is letter D. Authentication Bypass may sometimes occur when there are usernames that are almost similar to each other. There are some people who try their best to copy certain usernames and they will do it in such a way that the sy
Why are network access permissions established?
Only the resources authorized for that user will be at risk
Why not? Statistics show that many companies connected to the Internet are not sufficiently secure.
Many companies do not have a written security policy in place. Many companies have insufficient protection between the Internet and company networks. Many companies have insufficient information about the traffic over the company networks.