Q1) a non sealed/non final method or class can be
a)inherited
b)hashed
c)encrypted
d)volatile
Q2)How is plain text protected while in transmit over network?
a)By being place in cookie
b)By being encrypted and/or using SSL
c)By using secret code
d)by using XML
Q3)--------is keeping track of user activity while the user is logger in?
a)session management
b)l ogging
c)scanning
d)validation
Q4)how can direct access of
JSP can be prevented ?
a)put the JSP pages in a directory under WEB-INF , for example ,WEB-INF/jsp
b)use container security
c)none
d)both a) and b)
Q5)Failing to --- output makes the application vulnerable to cross site scripting ?
a)decode
b)validate
c)encode
d)
test
Q6)The option “remember me in this system “ is an example of
a)logging
b)authorization
c)authentication
d)session management
Q7)____________is keeping track of user activities when the user is logged in
Seesion mngt
Logging
Scanning
Validation
Q8)How passwords stored
Encrypted
Hashed
Plain text
None
Q9)which of the following is a valid programming error category Risky Resource Management ?
a)proper initialization
b)Trusted search path
C)Improper initialization
d)correct calculation
Q10)which of the following is a valid programming error category insecure Interaction between components ?
a)Proper input validation
b)Improper input validation
c)proper output validation
d)proper data validation
Q11)which of the following is the most affected by denial-of-service attacks?
a)Availability
b)Confidentially
c)Integrity
d)authenticity