Fill This Form To Receive Instant Help
Homework answers / question archive / QUESTION 1 In an open source software anyone can manipulate and change a piece of software so that the program or application can work
QUESTION 1
In an open source software anyone can manipulate and change a piece of software so that the program or application can work.
Choose one • 1 point
True
False
QUESTION 2
Which layer of the application stack could a misconfiguration affect?
Choose one • 1 point
Application stack, network layer
Source code and network
Application stack, network layer and cloud
QUESTION 3
Cross-Site Scripting allows an attacker to
Choose one • 1 point
Execute script(s) in a victim's browser.
Execute script(s) in a victim's kernel.
QUESTION 4
PUT request is
Choose one • 1 point
puts a file or resource at a specific URI, and exactly at that URI. If there's already a file or resource at that URI, PUT deletes that file or resource.
puts a file or resource at a specific URI, and exactly at that URI. If there's already a file or resource at that URI, PUT replaces that file or resource.
puts a file or resource at a specific URI, and exactly at that URI. If there's already a file or resource at that URI, PUT replaces that file or resource. If there is no file or resource there, PUT creates one.
QUESTION 5
Higher the percentage of code coverage; the lower are the chances of having _____________.
.
Enter an answer • 1 point
QUESTION 6
Unit testing is performed at what level?
Choose one • 1 point
QUESTION 7
When does security misconfiguration happen?
Choose one • 1 point
Security settings are not properly set during the configuration process.
Security settings are not properly set during the configuration process or deployed and maintained with most up to date settings.
Security settings are properly set during the configuration process.
Security settings are properly set during the configuration process or deployed and maintained with most up to date settings.
QUESTION 8
Sessions are stored on the browser and handled by cookies
Choose one • 1 point
False, sessions are stored on the server side.
True, and cookies can be manipulated.
QUESTION 9
What is Insecure Direct Object Reference?
Choose one • 1 point
Accessing sensitive data on the server by simple url manipulation
Accessing sensitive data on the server by code injection
QUESTION 10
DAST stands for
Choose one • 1 point
Dynamic Application System Testing
Dynamic Application Security Testing
QUESTION 11
One of the best ways to handle Insecure Direct Object References is ______________________.