Which of the following is this an example of?
After Matt, a user, enters his username and password at the login screen of a web enabled portal,
the following appears on his screen:
`Please only use letters and numbers on these fields’
Which of the following is this an example of?
why is input validation important?
In regards to secure coding practices, why is input validation important?
Input validation is an important security defense because it:
Input validation is an important security defense because it:
which boundary checking is not performed?
Which of the following is a common coding error in which boundary checking is not performed?
One of the most consistently reported software security vulnerabilities that leads to major exploits is:
One of the most consistently reported software security vulnerabilities that leads to major exploits
is:
Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on
a production system?
The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-si
The BEST methods for a web developer to prevent the website application code from being
vulnerable to cross-site request forgery (XSRF) are to: (Select TWO).
Which of the following has MOST likely occurred?
After visiting a website, a user receives an email thanking them for a purchase which they did not
request. Upon investigation the security administrator sees the following source code in a pop-up
window:
<HTML>
<body onload=”document.getElementByID(‘badForm’).submit()”>
<form id=”badForm” action=”shoppingsite.company.com/purchase.php” method=”post” >
<input name=”Perform Purchase” value=”Perform Purchase”/>
</form>
</body>
</HTML>
Which of the following has MOST likely occurred?
Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?
Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?