0

Application threat modeling Quiz - 1

Description: Application threat modeling, Security, Security tools and best practices
Number of Questions: 19
Created by:
Tags: security technology
Attempted 0/19 Correct 0 Score 0

When you developing an application both secured and not secured web pages, what is the reason for the need to have the login page SSL enabled

  1. MITM proxy can be used to change the URL to a non secured one

  2. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user

  3. Firewall logs will have the credentials in plain text

  4. proxy logs will have the credentials in plain text


Correct Option: B
Explanation:

To develop an application that includes both secured and non-secured web pages, it is important to have the login page SSL (Secure Sockets Layer) enabled in order to protect sensitive user information. The SSL protocol is used to establish a secure and encrypted connection between the user's web browser and the web server.

Now, let's go through each option and explain why it is right or wrong:

A. MITM proxy can be used to change the URL to a non-secured one - This option is a possible security vulnerability. A Man-in-the-Middle (MITM) attack can be used to intercept the user's traffic and redirect them to a non-secured URL. However, enabling SSL on the login page does not directly mitigate this threat.

B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user - This option is correct. If the login page is not SSL enabled, the credentials supplied by the user will be transmitted in plain text, which can be sniffed by attackers. This can lead to sensitive information such as usernames and passwords being compromised.

C. Firewall logs will have the credentials in plain text - This option is incorrect. Enabling SSL on the login page does not directly affect the firewall logs. Firewall logs can capture network traffic, including login credentials, regardless of whether SSL is enabled or not.

D. Proxy logs will have the credentials in plain text - This option is also correct. If SSL is not enabled on the login page, the credentials supplied by the user will be transmitted in plain text, which can be captured by proxies. This can lead to sensitive information such as usernames and passwords being compromised.

Therefore, the correct answer is:

The Answer is: B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and attacker can sniff the credentials supplied by the user.

In a multi-staged login in an application, what is that to be ensured for application security by the developer

  1. During multi-staged login, the application should validate the credentials supplied at each stage only

  2. Hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at server end

  3. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages

  4. Credentials supplied at the prevoius stage should be saved in cookie and current stage supplier credentials to be validated at server end


Correct Option: C
Explanation:

To ensure application security during multi-staged login in an application, the developer should ensure that the credentials supplied at each stage are validated before moving to the next stage.

Option A states that the application should validate the credentials supplied at each stage only. This option is partially correct. Validation of credentials at each stage is necessary, but validating only at each stage is not enough. It is important to validate the credentials of previous stages as well to ensure security.

Option B suggests that hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at the server end. Hidden variables can be used to store data, but they do not guarantee security. Attackers can access and modify hidden variables, which can lead to security vulnerabilities.

Option C is the correct answer. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages. This ensures that all supplied credentials are correct and valid before allowing access to the application.

Option D suggests that credentials supplied at the previous stage should be saved in a cookie and current stage supplier credentials to be validated at the server end. Saving credentials in cookies can also lead to security vulnerabilities as attackers can access and modify cookies.

Therefore, the correct answer is:

The Answer is: C. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages.

Which of the following is an attack technique used to exploit "dynamic file include" mechanisms in web applications

  1. Dynamic File Attack

  2. Remote File Inclusion

  3. Dynamic Data Attack

  4. Data Dynamics


Correct Option: B

AI Explanation

To answer this question, you need to understand the concept of "dynamic file include" mechanisms in web applications and the attack techniques used to exploit them.

Option A) Dynamic File Attack - This option is incorrect because "dynamic file attack" is not a recognized attack technique used to exploit "dynamic file include" mechanisms in web applications.

Option B) Remote File Inclusion - This option is correct because "remote file inclusion" is a common attack technique used to exploit "dynamic file include" mechanisms in web applications. It involves an attacker including a remote file into a web application, which can allow them to execute malicious code or gain unauthorized access.

Option C) Dynamic Data Attack - This option is incorrect because "dynamic data attack" is not a recognized attack technique used to exploit "dynamic file include" mechanisms in web applications.

Option D) Data Dynamics - This option is incorrect because "data dynamics" is not a recognized attack technique used to exploit "dynamic file include" mechanisms in web applications.

The correct answer is B) Remote File Inclusion. This option is correct because "remote file inclusion" is a well-known attack technique used to exploit "dynamic file include" mechanisms in web applications.

What is Static Analysis

  1. Static Code Analysis is the analysis of software code by actually executing the binaries resulting from this code

  2. Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code

  3. Static Code Analysis is the analysis of executables resulting from this code

  4. None of the above


Correct Option: B

AI Explanation

To answer this question, you need to understand what static code analysis is.

Static code analysis is a method of analyzing software code without actually executing the binaries resulting from this code. It involves examining the code itself to identify potential issues, such as coding errors, security vulnerabilities, or non-compliance with coding standards.

Let's go through each option to understand why it is correct or incorrect:

Option A) Static Code Analysis is the analysis of software code by actually executing the binaries resulting from this code - This option is incorrect because static code analysis does not involve executing binaries. It focuses on analyzing the code itself.

Option B) Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code - This option is correct because it accurately describes static code analysis.

Option C) Static Code Analysis is the analysis of executables resulting from this code - This option is incorrect because static code analysis is performed on the source code before it is compiled into executables.

Option D) None of the above - This option is incorrect because option B is the correct answer.

The correct answer is B) Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code.

The process of addressing a security vulnerability by blocking an attack vector that could exploit it is known as

  1. Anti Patching

  2. Anti Attack

  3. Virtual Patching

  4. Patch Attack


Correct Option: C

AI Explanation

To answer this question, you need to understand the concept of addressing security vulnerabilities.

Option A) Anti Patching - This option is incorrect because "anti patching" does not describe the process of addressing a security vulnerability by blocking an attack vector.

Option B) Anti Attack - This option is incorrect because "anti attack" does not specifically refer to the process of addressing a security vulnerability by blocking an attack vector.

Option C) Virtual Patching - This option is correct because virtual patching refers to the process of addressing a security vulnerability by blocking an attack vector that could exploit it. Virtual patching involves implementing temporary security measures to protect against known vulnerabilities while a proper patch or fix is being developed and deployed.

Option D) Patch Attack - This option is incorrect because "patch attack" does not accurately describe the process of addressing a security vulnerability by blocking an attack vector.

The correct answer is C) Virtual Patching. This option is correct because it accurately describes the process of addressing a security vulnerability by blocking an attack vector that could exploit it.

  1. Web Applictation Firewall

  2. Application Based Intrusion Detection

  3. Database Monitoring

  4. Virtual Private Lan


Correct Option: B

ModSecurity is a popular

  1. Web Applictation Firewall

  2. Application Based Intrusion Detection

  3. Database Monitoring

  4. Virtual Private Lan


Correct Option: A
  1. Previlged User Monitoring

  2. Application Activity Monitoring

  3. Cyberattack Protection

  4. Database Recovery


Correct Option: D

Which of the following is a valid threat modelling methodology

  1. STRIDE

  2. PRIDE

  3. BRIDE

  4. RIDE


Correct Option: A

AI Explanation

To answer this question, you need to understand threat modeling and different methodologies used for it.

Threat modeling is a systematic approach used to identify, evaluate, and mitigate potential threats to a system or application. It helps in understanding and managing the risks associated with a system.

Let's go through each option to understand why it is correct or incorrect:

Option A) STRIDE - This option is correct because STRIDE is a valid threat modeling methodology. STRIDE stands for Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege. It is a framework that helps in identifying and categorizing threats based on these six categories.

Option B) PRIDE - This option is incorrect because PRIDE is not a valid threat modeling methodology. It is not commonly used or recognized in the field of threat modeling.

Option C) BRIDE - This option is incorrect because BRIDE is not a valid threat modeling methodology. It is not commonly used or recognized in the field of threat modeling.

Option D) RIDE - This option is incorrect because RIDE is not a valid threat modeling methodology. It is not commonly used or recognized in the field of threat modeling.

The correct answer is Option A) STRIDE. This option is correct because STRIDE is a widely recognized and used threat modeling methodology.

  1. HTTP Parameter Pollution

  2. Session Splitting

  3. Parameter Damage

  4. Parameter Busting


Correct Option: A
Explanation:

To solve this question, the user needs to understand the concept of security vulnerabilities related to web applications.

The correct answer is A. HTTP Parameter Pollution.

Explanation:

HTTP Parameter Pollution (HPP) is a security vulnerability that arises when an attacker submits multiple input parameters of the same name to a web application. This can lead to unexpected behaviors on the server-side and client-side, which can then be exploited by attackers to achieve their goals.

Option B, Session Splitting, is not related to the given premise. Session Splitting is a technique used to distribute user sessions across multiple servers to improve performance and scalability.

Option C, Parameter Damage, is not a commonly used term in the field of web application security. It is not related to the given premise.

Option D, Parameter Busting, is not a commonly used term in the field of web application security. It is not related to the given premise.

Therefore, the correct answer is:

The Answer is: A. HTTP Parameter Pollution.

  1. Evercookie is a javascript API available that produces extremely persistent cookies in a browser

  2. Evercookie is a cookie anonymysing tool

  3. Evercookie is a FireFox Plugin

  4. Evercookie is a cookie pollution tool


Correct Option: A

Which of the following is a valid crypto graphic attack

  1. Padding Oracle Attack

  2. Padding CBC Attack

  3. Oracle Lockback

  4. Padding Filter


Correct Option: A

AI Explanation

To answer this question, you need to understand cryptographic attacks. Let's go through each option to understand why it is correct or incorrect:

Option A) Padding Oracle Attack - This option is correct. A padding oracle attack is a type of cryptographic attack that targets systems using padding in cryptographic protocols. The attacker exploits the system's behavior when it receives padding errors to decrypt or manipulate encrypted data.

Option B) Padding CBC Attack - This option is incorrect. Padding CBC attack is not a recognized cryptographic attack. CBC (Cipher Block Chaining) is a mode of operation for block ciphers, and padding is a technique used to ensure that the length of the plaintext is a multiple of the block size. However, padding CBC attack is not a known attack.

Option C) Oracle Lockback - This option is incorrect. Oracle Lockback is not a recognized cryptographic attack. It seems to be a made-up term.

Option D) Padding Filter - This option is incorrect. Padding Filter is not a recognized cryptographic attack. It seems to be a made-up term.

The correct answer is A) Padding Oracle Attack. This option is correct because a padding oracle attack is a valid cryptographic attack where the attacker exploits padding errors in cryptographic protocols.

Strcpy(), strcat(), strncpy(), sprint(), gets() are all included in

  1. Safe APIs

  2. Banned APIs

  3. String APIs

  4. CAPIs


Correct Option: B

AI Explanation

To answer this question, you need to understand the purpose and characteristics of these functions.

Option A) Safe APIs - This option is incorrect because some of the functions mentioned, such as gets(), are considered unsafe and can lead to buffer overflow vulnerabilities.

Option B) Banned APIs - This option is correct because some of the functions mentioned, such as gets(), are considered unsafe and have been banned in modern programming practices due to security concerns.

Option C) String APIs - This option is incorrect because while some of the functions mentioned, such as strcpy(), strcat(), and strncpy(), are related to manipulating strings, not all of them fall into this category.

Option D) CAPIs - This option is incorrect because the term "CAPIs" is not commonly used to refer to these functions.

The correct answer is B) Banned APIs. This option is correct because some of the functions mentioned, such as gets(), have been banned in modern programming practices due to security vulnerabilities.

_________is a free static code analysis tool from Microsoft that checks .NET managed code assemblies for conformance to Microsoft's .NET Framework Design Guidelines

  1. MsCop

  2. FxCop

  3. RsCop

  4. DxCop


Correct Option: B

AI Explanation

To answer this question, you need to be familiar with the static code analysis tool provided by Microsoft for checking .NET managed code assemblies against the .NET Framework Design Guidelines.

Option A) MsCop - This option is incorrect because there is no known tool called "MsCop" provided by Microsoft for static code analysis.

Option B) FxCop - This option is correct. FxCop is a free static code analysis tool from Microsoft that checks .NET managed code assemblies for conformance to Microsoft's .NET Framework Design Guidelines.

Option C) RsCop - This option is incorrect because there is no known tool called "RsCop" provided by Microsoft for static code analysis.

Option D) DxCop - This option is incorrect because there is no known tool called "DxCop" provided by Microsoft for static code analysis.

The correct answer is B) FxCop. This option is correct because FxCop is the free static code analysis tool from Microsoft that checks .NET managed code assemblies for conformance to Microsoft's .NET Framework Design Guidelines.

Ollydbg is a popular

  1. Compiler

  2. Reverse Engineering tool

  3. Database Monitoring tool

  4. Macro Analyzer


Correct Option: B

AI Explanation

To answer this question, you need to understand the purpose of Ollydbg.

Option A) Compiler - This option is incorrect because Ollydbg is not a compiler. A compiler is a software tool that converts source code written in a programming language into machine code or executable code.

Option B) Reverse Engineering tool - This option is correct. Ollydbg is a popular reverse engineering tool used for analyzing and debugging binary files, such as executable programs and libraries. It allows users to examine the code, modify it, and understand how it works.

Option C) Database Monitoring tool - This option is incorrect. Ollydbg is not a database monitoring tool. Database monitoring tools are used to track and analyze the performance, usage, and behavior of databases.

Option D) Macro Analyzer - This option is incorrect. Ollydbg is not a macro analyzer. A macro analyzer is a tool used to analyze and track macros in programming languages.

The correct answer is B) Reverse Engineering tool. This option is correct because Ollydbg is widely known and used as a tool for reverse engineering and analyzing binary files.

NOP sled technique is a popular

  1. Reverse Engineering Technique

  2. Buffer Overflow Attack Technique

  3. Log Analysing Technique

  4. Data Analysis Technique


Correct Option: B

AI Explanation

To answer this question, you need to understand the NOP sled technique and its purpose.

The NOP sled technique is a popular technique used in buffer overflow attacks.

A buffer overflow attack occurs when a program or system tries to store more data in a buffer than it was designed to hold. This can lead to the overwriting of adjacent memory locations, allowing an attacker to execute arbitrary code or take control of the system.

In a buffer overflow attack, the attacker injects malicious code into a buffer, and then overwrites the return address of a function with the address of the injected code. However, it can be challenging to precisely locate the injected code's address, especially if the buffer's size is not known.

This is where the NOP sled technique comes into play. NOP stands for "no operation," which is a type of instruction that does nothing when executed. The NOP sled is a long sequence of NOP instructions placed before the injected code. When the buffer overflow occurs, the execution flow will slide down the NOP sled until it reaches the injected code. This technique increases the chances of hitting the injected code's address, even if the exact location is not known.

Therefore, the correct answer is B) Buffer Overflow Attack Technique, as the NOP sled technique is commonly used in buffer overflow attacks.

- Hide questions