Test your knowledge.

Are you prepared to block software attacks? Complete the quiz below to find out.


Question 1

What authentication strategy is best fit for a Java EE multi-user application which contains a public section and a restricted area?

Question 2

Which of the options below best describes how to identify a user's role?

Question 3

What is the best method to avoid Authorization Bypass issues?

Question 4

What is the best way to store user passwords in a database?

Question 5

Which of the following hashing algorithms is NOT out-dated?

Question 6

Which communication protocol would you select for your server configuration ?

Question 7

You are implementing a TLS client, but your test server has a self-signed certificate and the connection fails.

Question 8

The following snippets represent an account lockout mechanism. Which of the following choices has a vulnerability?

Question 9

Which of the following statements about account lockout is against security best practices?

Question 10

Which is the best way to ensure the integrity of software updates?

Question 11

Which of the snippets below has a security issue?

Question 12

Which of the following is the most effective defense against XSS?

Question 13

Which of the following HTTP response headers prevents "Inclusion of Functionality from Untrusted Control Sphere" and increases the attack complexity for XSS.

Question 14

Which is the most effective protection against Cross-Site Request Forgery?

Question 15

Which of the following extensions is considered dangerous during a file upload to a Java EE application?

Question 16

Which of the following best prevents path traversal?

Question 17

Can XML files be used to "steal" data from system where the application is running?

Question 18

The support team has created a maintenance bash script that they have provided to many customers. There are requests to productize the script, so customers no longer have to SSH into the boxes. Which approach should you take?

Question 19

Your application needs to run an operation with elevated privileges. Which approach should you take?

Question 20

You must implement a feature that allows users to download server logs. What is the best way to implement it?

Question 21

Which of the statements below protects from SQL Injection?

Question 22

Which of the following functions is considered safer?

Question 23

Which of the following snippets is a format string injection vulnerability?

Question 24

How can you best protect against buffer overflow?

Question 25

Which is the best way to prevent Deserialization attacks?