12. In which way does machine learning make modern web application firewalls more
effective?
A. It allows them to return search results quicker than using traditional filtering
methods.
B. It allows them to adapt to ever changing threat landscape
C. It allows applications to access on line content faster
D. It allows them to choose the most suitable web application for a specified task
13. Which type of attack exploits the trust that a site has in a user's browser?
A. Session hijacking
B. Cross Site Request Forgery
C. SQL Injection
D. CrossSite Scripting
14. What information is the attacker hoping to steal in an XSSattack?
A. Session ID through cookies
B. HTTPSocket layer information
C. CSRFToken information
D. Session ID through tokens
15. 1. Which of the following HSTSheaders will disable the HSTSrule on the browser?
A. Strict-Transport-Security: max-age=none.
B. Strict-Transport-Security: max-age=disable
C. Strict-Transport-Security: max-age=0.
D.
Strict-Transport-Security:
max-age=
1111
;
includeSubDomains;
preload.
True/False (5 marks)
1. The logout process in a web app should mark the session as expired on the server.
2. The Same Origin Policy used for the DOM is the same as the Same Origin Policy
applied to cookies.
3. Cross-Origin Resource Sharing (CORS) is an HTTP-header-based mechanism that
instructs a server to deny loading resources from any origins other than its own.
4. Two-factor authentication (a password together with a Time-based One-time
Password (TOTP)code) is an example of defense-in-depth.
5. If site-a.com loads a website from another domain, site-b.com, inside of an iframe, the
same origin policy prevents JavaScript from site-a.com from accessing any of site-
b.com's website content in the iframe .
.'
3