0

Application threat modeling Quiz - 1

Description: Application threat modeling, Security, Security tools and best practices
Number of Questions: 19
Created by:
Tags: security technology
Attempted 0/19 Correct 0 Score 0
  1. MITM proxy can be used to change the URL to a non secured one

  2. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user

  3. Firewall logs will have the credentials in plain text

  4. proxy logs will have the credentials in plain text


Correct Option: B
Explanation:

To develop an application that includes both secured and non-secured web pages, it is important to have the login page SSL (Secure Sockets Layer) enabled in order to protect sensitive user information. The SSL protocol is used to establish a secure and encrypted connection between the user's web browser and the web server.

Now, let's go through each option and explain why it is right or wrong:

A. MITM proxy can be used to change the URL to a non-secured one - This option is a possible security vulnerability. A Man-in-the-Middle (MITM) attack can be used to intercept the user's traffic and redirect them to a non-secured URL. However, enabling SSL on the login page does not directly mitigate this threat.

B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user - This option is correct. If the login page is not SSL enabled, the credentials supplied by the user will be transmitted in plain text, which can be sniffed by attackers. This can lead to sensitive information such as usernames and passwords being compromised.

C. Firewall logs will have the credentials in plain text - This option is incorrect. Enabling SSL on the login page does not directly affect the firewall logs. Firewall logs can capture network traffic, including login credentials, regardless of whether SSL is enabled or not.

D. Proxy logs will have the credentials in plain text - This option is also correct. If SSL is not enabled on the login page, the credentials supplied by the user will be transmitted in plain text, which can be captured by proxies. This can lead to sensitive information such as usernames and passwords being compromised.

Therefore, the correct answer is:

The Answer is: B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and attacker can sniff the credentials supplied by the user.

In a multi-staged login in an application, what is that to be ensured for application security by the developer

  1. During multi-staged login, the application should validate the credentials supplied at each stage only

  2. Hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at server end

  3. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages

  4. Credentials supplied at the prevoius stage should be saved in cookie and current stage supplier credentials to be validated at server end


Correct Option: C
Explanation:

To ensure application security during multi-staged login in an application, the developer should ensure that the credentials supplied at each stage are validated before moving to the next stage.

Option A states that the application should validate the credentials supplied at each stage only. This option is partially correct. Validation of credentials at each stage is necessary, but validating only at each stage is not enough. It is important to validate the credentials of previous stages as well to ensure security.

Option B suggests that hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at the server end. Hidden variables can be used to store data, but they do not guarantee security. Attackers can access and modify hidden variables, which can lead to security vulnerabilities.

Option C is the correct answer. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages. This ensures that all supplied credentials are correct and valid before allowing access to the application.

Option D suggests that credentials supplied at the previous stage should be saved in a cookie and current stage supplier credentials to be validated at the server end. Saving credentials in cookies can also lead to security vulnerabilities as attackers can access and modify cookies.

Therefore, the correct answer is:

The Answer is: C. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages.

Which of the following is an attack technique that forces a web site to echo client-supplied data, which execute in a user’s web browser

  1. XSS

  2. Reflection Attack

  3. Mirror Attack

  4. XSLT


Correct Option: A

AI Explanation

To answer this question, you need to understand the concept of different attack techniques used in web security.

Let's go through each option to understand why it is correct or incorrect:

Option A) XSS (Cross-Site Scripting) - This option is correct. XSS is an attack technique that forces a website to echo client-supplied data, which then executes in a user's web browser. This allows the attacker to inject malicious code into the website and potentially steal sensitive information or perform unauthorized actions.

Option B) Reflection Attack - This option is incorrect. A reflection attack is a type of DDoS attack that exploits the use of reflection amplification techniques to overwhelm a target system with traffic. It does not involve forcing a website to echo client-supplied data.

Option C) Mirror Attack - This option is incorrect. A mirror attack is not a recognized term in the context of web security. It does not relate to the described attack technique.

Option D) XSLT (Extensible Stylesheet Language Transformations) - This option is incorrect. XSLT is a language used for transforming XML documents into different formats. It is not an attack technique that forces a website to echo client-supplied data.

The correct answer is Option A) XSS. This option is correct because XSS is an attack technique that fits the description provided in the question.

  1. Static Code Analysis is the analysis of software code by actually executing the binaries resulting from this code

  2. Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code

  3. Static Code Analysis is the analysis of executables resulting from this code

  4. None of the above


Correct Option: B

The process of addressing a security vulnerability by blocking an attack vector that could exploit it is known as

  1. Anti Patching

  2. Anti Attack

  3. Virtual Patching

  4. Patch Attack


Correct Option: C

AI Explanation

To answer this question, you need to understand the concept of addressing security vulnerabilities.

Option A) Anti Patching - This option is incorrect because "anti patching" does not describe the process of addressing a security vulnerability by blocking an attack vector.

Option B) Anti Attack - This option is incorrect because "anti attack" does not specifically refer to the process of addressing a security vulnerability by blocking an attack vector.

Option C) Virtual Patching - This option is correct because virtual patching refers to the process of addressing a security vulnerability by blocking an attack vector that could exploit it. Virtual patching involves implementing temporary security measures to protect against known vulnerabilities while a proper patch or fix is being developed and deployed.

Option D) Patch Attack - This option is incorrect because "patch attack" does not accurately describe the process of addressing a security vulnerability by blocking an attack vector.

The correct answer is C) Virtual Patching. This option is correct because it accurately describes the process of addressing a security vulnerability by blocking an attack vector that could exploit it.

  1. Web Applictation Firewall

  2. Application Based Intrusion Detection

  3. Database Monitoring

  4. Virtual Private Lan


Correct Option: B

ModSecurity is a popular

  1. Web Applictation Firewall

  2. Application Based Intrusion Detection

  3. Database Monitoring

  4. Virtual Private Lan


Correct Option: A

Any attack which is based on information gained from physical implementation of a crypto system,rather than brute force or algorithm weakness is known as

  1. Back Attack

  2. Unknown Attack

  3. Reverse Attack

  4. Side Channel Attack


Correct Option: D

AI Explanation

To answer this question, we need to understand the concept of side channel attacks.

Option A) Back Attack - This option is incorrect because there is no specific attack known as a "back attack" in the context of cryptography.

Option B) Unknown Attack - This option is incorrect because the term "unknown attack" does not specifically refer to attacks based on information gained from the physical implementation of a crypto system.

Option C) Reverse Attack - This option is incorrect because the term "reverse attack" does not specifically refer to attacks based on information gained from the physical implementation of a crypto system.

Option D) Side Channel Attack - This option is correct. A side channel attack is an attack on a cryptographic system that is based on information gained from the physical implementation of the system, rather than relying on brute force or algorithm weaknesses. Side channel attacks exploit unintended side effects of a system's implementation, such as timing information, power consumption, electromagnetic radiation, or sound, to gain information about the secret key or plaintext.

The correct answer is D) Side Channel Attack. This option is correct because it accurately describes an attack that is based on information gained from the physical implementation of a crypto system.

Which of the following is not a function of Database Activity Monitor

  1. Previlged User Monitoring

  2. Application Activity Monitoring

  3. Cyberattack Protection

  4. Database Recovery


Correct Option: D

Which of the following is a valid method of classifying computer security threats

  1. DREAD

  2. FEAR

  3. SAFE

  4. DEAF


Correct Option: A

AI Explanation

To answer this question, you need to understand the method of classifying computer security threats. Let's go through each option to understand why it is correct or incorrect:

Option A) DREAD - This option is correct because DREAD is a valid method of classifying computer security threats. DREAD stands for Damage, Reproducibility, Exploitability, Affected users, and Discoverability. It is a risk assessment model used to prioritize threats based on these factors.

Option B) FEAR - This option is incorrect because FEAR is not a valid method of classifying computer security threats. FEAR is not an established acronym or model used in the field of computer security.

Option C) SAFE - This option is incorrect because SAFE is not a valid method of classifying computer security threats. SAFE is not an established acronym or model used in the field of computer security.

Option D) DEAF - This option is incorrect because DEAF is not a valid method of classifying computer security threats. DEAF is not an established acronym or model used in the field of computer security.

The correct answer is A) DREAD. This option is correct because DREAD is a valid method of classifying computer security threats based on factors like Damage, Reproducibility, Exploitability, Affected users, and Discoverability.

  1. HTTP Parameter Pollution

  2. Session Splitting

  3. Parameter Damage

  4. Parameter Busting


Correct Option: A
Explanation:

To solve this question, the user needs to understand the concept of security vulnerabilities related to web applications.

The correct answer is A. HTTP Parameter Pollution.

Explanation:

HTTP Parameter Pollution (HPP) is a security vulnerability that arises when an attacker submits multiple input parameters of the same name to a web application. This can lead to unexpected behaviors on the server-side and client-side, which can then be exploited by attackers to achieve their goals.

Option B, Session Splitting, is not related to the given premise. Session Splitting is a technique used to distribute user sessions across multiple servers to improve performance and scalability.

Option C, Parameter Damage, is not a commonly used term in the field of web application security. It is not related to the given premise.

Option D, Parameter Busting, is not a commonly used term in the field of web application security. It is not related to the given premise.

Therefore, the correct answer is:

The Answer is: A. HTTP Parameter Pollution.

What is a an Evercookie?

  1. Evercookie is a javascript API available that produces extremely persistent cookies in a browser

  2. Evercookie is a cookie anonymysing tool

  3. Evercookie is a FireFox Plugin

  4. Evercookie is a cookie pollution tool


Correct Option: A

AI Explanation

To answer this question, you need to understand what an Evercookie is.

Option A) Evercookie is a javascript API available that produces extremely persistent cookies in a browser - This option is correct. An Evercookie is a JavaScript API that is designed to produce extremely persistent cookies in a web browser. It uses various techniques to store cookie data in multiple locations, making it difficult to remove or delete these cookies.

Option B) Evercookie is a cookie anonymizing tool - This option is incorrect. Evercookie is not a cookie anonymizing tool. It is a tool that creates persistent cookies.

Option C) Evercookie is a Firefox Plugin - This option is incorrect. Evercookie is not a Firefox plugin. It is a JavaScript API that works on multiple web browsers.

Option D) Evercookie is a cookie pollution tool - This option is incorrect. Evercookie is not a cookie pollution tool. It is a tool that creates persistent cookies.

The correct answer is A) Evercookie is a javascript API available that produces extremely persistent cookies in a browser. This option is correct because an Evercookie is a JavaScript API that creates persistent cookies in a web browser.

  1. Padding Oracle Attack

  2. Padding CBC Attack

  3. Oracle Lockback

  4. Padding Filter


Correct Option: A

Strcpy(), strcat(), strncpy(), sprint(), gets() are all included in

  1. Safe APIs

  2. Banned APIs

  3. String APIs

  4. CAPIs


Correct Option: B

AI Explanation

To answer this question, you need to understand the purpose and characteristics of these functions.

Option A) Safe APIs - This option is incorrect because some of the functions mentioned, such as gets(), are considered unsafe and can lead to buffer overflow vulnerabilities.

Option B) Banned APIs - This option is correct because some of the functions mentioned, such as gets(), are considered unsafe and have been banned in modern programming practices due to security concerns.

Option C) String APIs - This option is incorrect because while some of the functions mentioned, such as strcpy(), strcat(), and strncpy(), are related to manipulating strings, not all of them fall into this category.

Option D) CAPIs - This option is incorrect because the term "CAPIs" is not commonly used to refer to these functions.

The correct answer is B) Banned APIs. This option is correct because some of the functions mentioned, such as gets(), have been banned in modern programming practices due to security vulnerabilities.

Ollydbg is a popular

  1. Compiler

  2. Reverse Engineering tool

  3. Database Monitoring tool

  4. Macro Analyzer


Correct Option: B

AI Explanation

To answer this question, you need to understand the purpose of Ollydbg.

Option A) Compiler - This option is incorrect because Ollydbg is not a compiler. A compiler is a software tool that converts source code written in a programming language into machine code or executable code.

Option B) Reverse Engineering tool - This option is correct. Ollydbg is a popular reverse engineering tool used for analyzing and debugging binary files, such as executable programs and libraries. It allows users to examine the code, modify it, and understand how it works.

Option C) Database Monitoring tool - This option is incorrect. Ollydbg is not a database monitoring tool. Database monitoring tools are used to track and analyze the performance, usage, and behavior of databases.

Option D) Macro Analyzer - This option is incorrect. Ollydbg is not a macro analyzer. A macro analyzer is a tool used to analyze and track macros in programming languages.

The correct answer is B) Reverse Engineering tool. This option is correct because Ollydbg is widely known and used as a tool for reverse engineering and analyzing binary files.

  1. Reverse Engineering Technique

  2. Buffer Overflow Attack Technique

  3. Log Analysing Technique

  4. Data Analysis Technique


Correct Option: B
- Hide questions