1- Adam is conducting software testing by reviewing the source code of the application. What type of code testing is Adam conducting?
A. Mutation testing
B. Static code analysis
C. Dynamic code analysis
D. Fuzzing
2- Charles is worried about users conducting SQL injection attacks. Which of the following solutions will best address his concerns?
A. Using secure session management
B. Enabling logging on the database
C. Performing user input validation
D. Implementing TLS
3- Precompiled SQL statements that only require variables to be input are an example of what type of application security control?
A. Parameterized queries
B. Encoding data
C. Input validation
D. Appropriate access controls
4- During a web application test, Ben discovers that the application shows SQL code as part of an error provided to application users. What should he note in his report?
A. Improper error handling
B. Code exposure
C. SQL injection
D. A default configuration issue
5- The application that Scott is writing has a flaw that occurs when two operations are attempted at the same time, resulting in unexpected results when the two actions do not occur in the expected order. What type of flaw does the application have?
A. De-referencing
B. A race condition
C. An insecure function
D. Improper error handling
6- Every time Susan checks code into her organization’s code repository, it is tested and validated, and then if accepted, it is immediately put into production. What is the term for this?
A. Continuous integration
B. Continuous delivery
C. A security nightmare
D. Agile development
7- Tim is working on a change to a web application used by his organization to fix a known bug. What environment should he be working in?
A. Test
B. Development
C. Staging
D. Production
8- Which one of the following software development models focuses on the early and continuous delivery of software?
A. Waterfall
B. Agile
C. Spiral
D. Butterfly
9- Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change. Which one of the following terms best describes his goal?
A. Scalability
B. Elasticity
C. Cost effectiveness
D. Agility
10- Which one of the following is not an advantage of database normalization?
A. Preventing data inconsistencies
B. Preventing injection attacks
C. Reducing the need for database restructuring
D. Making the database schema more informative
11- What data minimization technique replaces personal identifiers with unique identifiers that may be cross-referenced with a lookup table?
A. Tokenization
B. Hashing
C. Salting
D. Masking
12- Frank is investigating a security incident where the attacker entered a very long string into an input field, which was followed by a system command. What type of attack likely took place?
A. Cross-site request forgery
B. Server-side request forgery
C. Command injection
D. Buffer overflow
13- What type of attack places an attacker in the position to eavesdrop on communications between a user and a web server?
A. Man-in-the-middle
B. Session hijacking
C. Buffer overflow
D. Meet-in-the-middle
14- Tom is a software developer who creates code for sale to the public. He would like to assure his users that the code they receive actually came from him. What technique can he use to best provide this assurance?
A. Code signing
B. Code endorsement
C. Code encryption
D. Code obfuscation
15- What type of cross-site scripting attack would not be visible to a security professional inspecting the HTML source code in a browser?
A. Reflected XSSB. Stored XSS
C. Persistent XSS
D. DOM-based XSS
16- Joe checks his web server logs and sees that someone sent the following query string to an application running on the server: http://www mycompany.com/servicestatus.php?serviceID=892&serviceID=892’ ; DROP TABLE Services;– What type of attack was most likely attempted?
A. Cross-site scripting
B. Session hijacking
C. Parameter pollution
D. Man-in-the-middle
17- Upon further inspection, Joe finds a series of thousands of requests to the same URL coming from a single IP address. Here
are a few examples:
http: //www.mycompany.com/servicestatus.php?serviceID=1
http: //www.mycompany.com/servicestatus.php?serviceID=2
http: //www.mycompany.com/servicestatus.php?serviceID=3
http: //www.mycompany.com/servicestatus.php?serviceID=4
http: //www.mycompany.com/servicestatus.php?serviceID=5
http: //www.mycompany.com/servicestatus.php?serviceID=6
What type of vulnerability was the attacker likely trying to exploit?
A. Insecure direct object reference
B. File upload
C. Unvalidated redirect
D. Session hijacking
18- Joe’s adventures in web server log analysis are not yet complete. As he continues to review the logs, he finds the request http://www mycompany.com/../../../etc/passwdWhat type of attack was most likely attempted?
A. SQL injection
B. Session hijacking
C. Directory traversal
D. File upload
19- Wendy is a penetration tester who wishes to engage in a session hijacking attack. What information is crucial for Wendy to obtain if her attack will be successful?
A. Session ticket
B. Session cookie
C. Username
D. User password
20- Joe is examining the logs for his web server and discovers that auser sent input to a web application that contained the string
WAITFOR . What type of attack was the user likely attempting
A. Timing-based SQL injection
B. HTML injection
C. Cross-site scripting
D. Content-based SQL injection