0

Application threat modeling Quiz - 1

Description: Application threat modeling, Security, Security tools and best practices
Number of Questions: 19
Created by:
Tags: security technology
Attempted 0/19 Correct 0 Score 0

When you developing an application both secured and not secured web pages, what is the reason for the need to have the login page SSL enabled

  1. MITM proxy can be used to change the URL to a non secured one

  2. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user

  3. Firewall logs will have the credentials in plain text

  4. proxy logs will have the credentials in plain text


Correct Option: B
Explanation:

To develop an application that includes both secured and non-secured web pages, it is important to have the login page SSL (Secure Sockets Layer) enabled in order to protect sensitive user information. The SSL protocol is used to establish a secure and encrypted connection between the user's web browser and the web server.

Now, let's go through each option and explain why it is right or wrong:

A. MITM proxy can be used to change the URL to a non-secured one - This option is a possible security vulnerability. A Man-in-the-Middle (MITM) attack can be used to intercept the user's traffic and redirect them to a non-secured URL. However, enabling SSL on the login page does not directly mitigate this threat.

B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user - This option is correct. If the login page is not SSL enabled, the credentials supplied by the user will be transmitted in plain text, which can be sniffed by attackers. This can lead to sensitive information such as usernames and passwords being compromised.

C. Firewall logs will have the credentials in plain text - This option is incorrect. Enabling SSL on the login page does not directly affect the firewall logs. Firewall logs can capture network traffic, including login credentials, regardless of whether SSL is enabled or not.

D. Proxy logs will have the credentials in plain text - This option is also correct. If SSL is not enabled on the login page, the credentials supplied by the user will be transmitted in plain text, which can be captured by proxies. This can lead to sensitive information such as usernames and passwords being compromised.

Therefore, the correct answer is:

The Answer is: B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and attacker can sniff the credentials supplied by the user.

In a multi-staged login in an application, what is that to be ensured for application security by the developer

  1. During multi-staged login, the application should validate the credentials supplied at each stage only

  2. Hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at server end

  3. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages

  4. Credentials supplied at the prevoius stage should be saved in cookie and current stage supplier credentials to be validated at server end


Correct Option: C
Explanation:

To ensure application security during multi-staged login in an application, the developer should ensure that the credentials supplied at each stage are validated before moving to the next stage.

Option A states that the application should validate the credentials supplied at each stage only. This option is partially correct. Validation of credentials at each stage is necessary, but validating only at each stage is not enough. It is important to validate the credentials of previous stages as well to ensure security.

Option B suggests that hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at the server end. Hidden variables can be used to store data, but they do not guarantee security. Attackers can access and modify hidden variables, which can lead to security vulnerabilities.

Option C is the correct answer. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages. This ensures that all supplied credentials are correct and valid before allowing access to the application.

Option D suggests that credentials supplied at the previous stage should be saved in a cookie and current stage supplier credentials to be validated at the server end. Saving credentials in cookies can also lead to security vulnerabilities as attackers can access and modify cookies.

Therefore, the correct answer is:

The Answer is: C. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages.

Which of the following is an attack technique used to exploit "dynamic file include" mechanisms in web applications

  1. Dynamic File Attack

  2. Remote File Inclusion

  3. Dynamic Data Attack

  4. Data Dynamics


Correct Option: B

AI Explanation

To answer this question, you need to understand the concept of "dynamic file include" mechanisms in web applications and the attack techniques used to exploit them.

Option A) Dynamic File Attack - This option is incorrect because "dynamic file attack" is not a recognized attack technique used to exploit "dynamic file include" mechanisms in web applications.

Option B) Remote File Inclusion - This option is correct because "remote file inclusion" is a common attack technique used to exploit "dynamic file include" mechanisms in web applications. It involves an attacker including a remote file into a web application, which can allow them to execute malicious code or gain unauthorized access.

Option C) Dynamic Data Attack - This option is incorrect because "dynamic data attack" is not a recognized attack technique used to exploit "dynamic file include" mechanisms in web applications.

Option D) Data Dynamics - This option is incorrect because "data dynamics" is not a recognized attack technique used to exploit "dynamic file include" mechanisms in web applications.

The correct answer is B) Remote File Inclusion. This option is correct because "remote file inclusion" is a well-known attack technique used to exploit "dynamic file include" mechanisms in web applications.

What is Static Analysis

  1. Static Code Analysis is the analysis of software code by actually executing the binaries resulting from this code

  2. Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code

  3. Static Code Analysis is the analysis of executables resulting from this code

  4. None of the above


Correct Option: B

AI Explanation

To answer this question, you need to understand what static code analysis is.

Static code analysis is a method of analyzing software code without actually executing the binaries resulting from this code. It involves examining the code itself to identify potential issues, such as coding errors, security vulnerabilities, or non-compliance with coding standards.

Let's go through each option to understand why it is correct or incorrect:

Option A) Static Code Analysis is the analysis of software code by actually executing the binaries resulting from this code - This option is incorrect because static code analysis does not involve executing binaries. It focuses on analyzing the code itself.

Option B) Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code - This option is correct because it accurately describes static code analysis.

Option C) Static Code Analysis is the analysis of executables resulting from this code - This option is incorrect because static code analysis is performed on the source code before it is compiled into executables.

Option D) None of the above - This option is incorrect because option B is the correct answer.

The correct answer is B) Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code.

  1. Web Applictation Firewall

  2. Application Based Intrusion Detection

  3. Database Monitoring

  4. Virtual Private Lan


Correct Option: B

ModSecurity is a popular

  1. Web Applictation Firewall

  2. Application Based Intrusion Detection

  3. Database Monitoring

  4. Virtual Private Lan


Correct Option: A

Which of the following is not a function of Database Activity Monitor

  1. Previlged User Monitoring

  2. Application Activity Monitoring

  3. Cyberattack Protection

  4. Database Recovery


Correct Option: D

Which of the following is a valid threat modelling methodology

  1. STRIDE

  2. PRIDE

  3. BRIDE

  4. RIDE


Correct Option: A

AI Explanation

To answer this question, you need to understand threat modeling and different methodologies used for it.

Threat modeling is a systematic approach used to identify, evaluate, and mitigate potential threats to a system or application. It helps in understanding and managing the risks associated with a system.

Let's go through each option to understand why it is correct or incorrect:

Option A) STRIDE - This option is correct because STRIDE is a valid threat modeling methodology. STRIDE stands for Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege. It is a framework that helps in identifying and categorizing threats based on these six categories.

Option B) PRIDE - This option is incorrect because PRIDE is not a valid threat modeling methodology. It is not commonly used or recognized in the field of threat modeling.

Option C) BRIDE - This option is incorrect because BRIDE is not a valid threat modeling methodology. It is not commonly used or recognized in the field of threat modeling.

Option D) RIDE - This option is incorrect because RIDE is not a valid threat modeling methodology. It is not commonly used or recognized in the field of threat modeling.

The correct answer is Option A) STRIDE. This option is correct because STRIDE is a widely recognized and used threat modeling methodology.

  1. HTTP Parameter Pollution

  2. Session Splitting

  3. Parameter Damage

  4. Parameter Busting


Correct Option: A
Explanation:

To solve this question, the user needs to understand the concept of security vulnerabilities related to web applications.

The correct answer is A. HTTP Parameter Pollution.

Explanation:

HTTP Parameter Pollution (HPP) is a security vulnerability that arises when an attacker submits multiple input parameters of the same name to a web application. This can lead to unexpected behaviors on the server-side and client-side, which can then be exploited by attackers to achieve their goals.

Option B, Session Splitting, is not related to the given premise. Session Splitting is a technique used to distribute user sessions across multiple servers to improve performance and scalability.

Option C, Parameter Damage, is not a commonly used term in the field of web application security. It is not related to the given premise.

Option D, Parameter Busting, is not a commonly used term in the field of web application security. It is not related to the given premise.

Therefore, the correct answer is:

The Answer is: A. HTTP Parameter Pollution.

  1. Evercookie is a javascript API available that produces extremely persistent cookies in a browser

  2. Evercookie is a cookie anonymysing tool

  3. Evercookie is a FireFox Plugin

  4. Evercookie is a cookie pollution tool


Correct Option: A
  1. Padding Oracle Attack

  2. Padding CBC Attack

  3. Oracle Lockback

  4. Padding Filter


Correct Option: A
  1. Compiler

  2. Reverse Engineering tool

  3. Database Monitoring tool

  4. Macro Analyzer


Correct Option: B

NOP sled technique is a popular

  1. Reverse Engineering Technique

  2. Buffer Overflow Attack Technique

  3. Log Analysing Technique

  4. Data Analysis Technique


Correct Option: B

AI Explanation

To answer this question, you need to understand the NOP sled technique and its purpose.

The NOP sled technique is a popular technique used in buffer overflow attacks.

A buffer overflow attack occurs when a program or system tries to store more data in a buffer than it was designed to hold. This can lead to the overwriting of adjacent memory locations, allowing an attacker to execute arbitrary code or take control of the system.

In a buffer overflow attack, the attacker injects malicious code into a buffer, and then overwrites the return address of a function with the address of the injected code. However, it can be challenging to precisely locate the injected code's address, especially if the buffer's size is not known.

This is where the NOP sled technique comes into play. NOP stands for "no operation," which is a type of instruction that does nothing when executed. The NOP sled is a long sequence of NOP instructions placed before the injected code. When the buffer overflow occurs, the execution flow will slide down the NOP sled until it reaches the injected code. This technique increases the chances of hitting the injected code's address, even if the exact location is not known.

Therefore, the correct answer is B) Buffer Overflow Attack Technique, as the NOP sled technique is commonly used in buffer overflow attacks.

- Hide questions