Advertisement
Advertisement
Advertisement

Web Application Quizzes & Trivia

Do you know the difference between software and a web browser? Can you tell the differences between tech-speak and programming languages?  So you are a computer whiz and know all there is to know about web applications. Maybe you work in technology and you create or develop web apps such as databases, interactive mapping software, online retail sales, webmail, online auctions and the likes.

Maybe your diction consists of words like n-tiered, plugin, roll out, SQL, ASP, etc. You also know that Django is not the name of a movie. And you also know that AJAX is not a Dutch football team.  If you can tell the differences between a native app and a web app and a hybrid app, and know everything there is to know about web applications, then roll out and see how well you fare in the application of your knowledge in these quizzes.
Top Trending



Questions: 26  |  Attempts: 3388   |  Last updated: Jul 9, 2020
  • Sample Question
    What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?

Basic questions which tests the candidate knowledge on OWASP guidelines.

Questions: 26  |  Attempts: 5847   |  Last updated: Mar 9, 2013
  • Sample Question
    What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?

This brief quiz is based on OWASP.org's Top-Ten 2007 Web Vulnerabilities The Top-10 provides a description of, examples for and solutions to the ten most commonly discovered vulnerabilities found in deployed web applications...

Questions: 9  |  Attempts: 1355   |  Last updated: Apr 21, 2017
  • Sample Question
    One operation that frequently has cross-site scripting (XSS) vulnerabilities is  (choose exactly 1 answer):



Questions: 10  |  Attempts: 1029   |  Last updated: Apr 2, 2020
  • Sample Question
    A web application implements a SQL operation in the following way (pseudocode): The application uses a MSSQL database running on a different machine from the web server. The database has one user (the built-in administrator account is not used).   An attacker could use the following parameters to get extra data from the database's contents:



Questions: 5  |  Attempts: 412   |  Last updated: Feb 22, 2013
  • Sample Question
    The most effective way of protecting against SQL injection is… 
Advertisement

Advertisement

Web Application Questions & Answers


What threat are you vulnerable to if you do not validate authorization of user for direct references to restricted resources?
The correct answer to this question is Insecure Direct Object References. These references happen when an application gives direct access to objects. The access is based on an input supplied by a user. This makes attackers get through authorizat
Which threat can be prevented by having unique usernames generated with a high degree of entropy?
The answer to this is letter D. Authentication Bypass may sometimes occur when there are usernames that are almost similar to each other. There are some people who try their best to copy certain usernames and they will do it in such a way that the sy
What is one operation that frequently has cross-site scripting (XSS) vulnerabilities?
A site produces an error message for an invalid user name.
Why not? Statistics show that many companies connected to the Internet are not sufficiently secure.
Many companies do not have a written security policy in place. Many companies have insufficient protection between the Internet and company networks. Many companies have insufficient information about the traffic over the company networks.
More More web application Questions