C. Out of Band
D. Inferential
11. Which of the following statements is an example of a horizontal privilege escalation?
A. A cloud customer can access data of other customers hosted in the same cloud
environment.
B. An attacker has accessto the administrators' interface URL.
C. A user can perform restricted actions on a web application.
D. A user has access to files and directories they are not authorized to have access
to.
12. If a web Application does not validate authorisation of the user for direct references to
restricted resources, it is vulnerable to
A. SQL injection
B. Insecure Direct Object References
C. Platform misconfiguration
D. URL-matching discrepancies
13. Which vulnerabilities may be missed by manual code reviews but picked up by
automated pen testing tools?
A. Logic Flaws
B. Authorization issues
C. Encryption misconfigurations
D. All the above
14. Which of the following cannot be accepted as a guideline to writing secure codes?
A. Storing Passwords as ciphertext.
B. Using hardcoded credentials in your code.
C. Writing a code that handles errors to prevent a program from crashing.
D. Cleaning and filtering input data
15. Hackers often gather a multitude of seemingly small, harmless pieces of configuration
about a site that, when combined, can help them attack a site. Which of the following error
messagesis typically considered NOTsafe to display to the user?
A. A messagethat states that the system is down for maintenance and tells what time it
is expected to be back up. E.g.:Our site is down. We're sorry for the inconvenience.
We are doing maintenance on our servers. The site should be up by 12h00.
B. An error message that says there was an internal error message and displays the call
stack to assist in debugging and reporting of the error. E.g.:There was an internal
error, please copy and paste this page to the sysadmin.
4