Q.1
A _______________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications.
  • a) Android application
  • b) Web application
  • c) PC application
  • d) Cloud application
Q.2
Which of the following is not an example of web application hacking?
  • a) Defacing websites
  • b) Stealing credit card information
  • c) Reverse engineering PC apps
  • d) Exploiting server-side scripting
Q.3
_______________ hacking refers to mistreatment of applications through HTTP or HTTPS that can be done by manipulating the web application through its graphical web interface or by tampering the Uniform Resource Identifier (URI).
  • a) Android application
  • b) Web application
  • c) PC application
  • d) Cloud application
Q.4
Which of the following is not an appropriate method of web application hacking?
  • a) XSS
  • b) CSRF
  • c) SQLi
  • d) Brute-force
Q.5
XSS stands for _________________
  • a) Crack Site Scripting
  • b) Cross Site Server
  • c) Cross Site Scripting
  • d) Crack Server Scripting
Q.6
Which of the following is not an example of web application hacking?
  • a) DNS Attack
  • b) Dumpster diving
  • c) Injecting Malicious code
  • d) Using the shell to destroy web application data
Q.7
Which of the following is not a threat of web application?
  • a) Reverse engineering
  • b) Command injection
  • c) DMZ protocol attack
  • d) Buffer Overflow
Q.8
Which of the following is not a threat of web application?
  • a) Session poisoning
  • b) Phishing
  • c) Cryptographic interception
  • d) Cookie snooping
Q.9
________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.
  • a) XSS
  • b) CSRF
  • c) CRLF
  • d) SQL
Q.10
Which of the following scripting language is used for injecting executable malicious code for web-app hacking?
  • a) C++
  • b) Tcl
  • c) Frame-Script
  • d) JavaScript
Q.11
______________ takes advantage if hidden fields that work as the only security measure in some applications.
  • a) Parameter tampering
  • b) Data tampering
  • c) Tampering of network topology
  • d) Protocol tampering
Q.12
_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.
  • a) Cache Snooping
  • b) Cookie-jacking
  • c) Cookie Snooping
  • d) Cache-compromising
Q.13
Which of the following is not an example of web application hacking technique?
  • a) LDAP injection
  • b) Cryptanalysis
  • c) Race condition attack
  • d) OS command injection.
0 h : 0 m : 1 s