Unit 4 - Practice Quiz

INT245 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which organization manages the standard awareness document for developers and web application security known as the 'Top 10'?

A. ISO
B. IEEE
C. NIST
D. OWASP

2 In the context of OWASP Top 10, which vulnerability allows an attacker to access unauthorized functionality or data, such as viewing another user's account details by simply changing a URL parameter?

A. Cryptographic Failures
B. Injection
C. Security Misconfiguration
D. Broken Access Control

3 Which attack involves an attacker stealing a valid session ID to gain unauthorized access to a web server?

A. Session Hijacking
B. SQL Injection
C. Buffer Overflow
D. Directory Traversal

4 What is the primary mechanism of a Cross-Site Request Forgery (CSRF) attack?

A. Injecting malicious SQL scripts into a database
B. Tricking a user's browser into sending an unwanted request to a trusted site where the user is authenticated
C. Executing scripts in the victim's browser via a reflected input
D. Brute-forcing the admin password

5 Which input would most likely be used to test for a basic SQL Injection vulnerability?

A. ' OR '1'='1
B. <script>alert(1)</script>
C. ../../etc/passwd
D. ping 127.0.0.1

6 What is the primary defense mechanism against SQL Injection attacks?

A. Using Parameterized Queries (Prepared Statements)
B. Using Hashing algorithms
C. Disabling JavaScript
D. Using SSL/TLS

7 Which type of XSS attack occurs when the malicious script is permanently stored on the target server (e.g., in a database or forum post)?

A. Blind XSS
B. Stored (Persistent) XSS
C. Reflected XSS
D. DOM-based XSS

8 In a DOM-based XSS attack, where does the security vulnerability lie?

A. In the web server configuration
B. In the network transport layer
C. In the client-side code (JavaScript) processing data
D. In the server-side database code

9 Which flag should be set on a Set-Cookie HTTP response header to prevent client-side scripts (like XSS payloads) from accessing the cookie?

A. SameSite
B. Expires
C. Secure
D. HttpOnly

10 BeEF is a popular penetration testing tool. What does the acronym stand for?

A. Backend Engineering Exploitation File
B. Binary Encryption and Encoding Facility
C. Basic Exploitation Environment Frontend
D. Browser Exploitation Framework

11 Which SQL injection technique involves asking the database true/false questions and determining the answer based on the application's response time?

A. Out-of-band SQLi
B. Time-based Blind SQLi
C. Union-based SQLi
D. Error-based SQLi

12 What is the mathematical logic often used in tautology-based SQL injection?

A.
B. where A is false
C. (Imaginary)
D. (Always True)

13 Which mobile deployment model allows employees to use their personal devices for work but requires them to install a Mobile Device Management (MDM) agent?

A. Direct Access
B. BYOD (Bring Your Own Device)
C. CYOD (Choose Your Own Device)
D. COPE (Corporate Owned, Personally Enabled)

14 Which OWASP Mobile Top 10 vulnerability refers to the storage of sensitive data (like passwords or API keys) in plain text within the device's file system?

A. Improper Platform Usage
B. Insecure Communication
C. Insecure Data Storage
D. Extraneous Functionality

15 What is 'Jailbreaking' in the context of mobile security?

A. Creating a sandbox environment for apps
B. Escaping a physical prison using a mobile phone
C. Encrypting the file system of an Android device
D. Removing software restrictions imposed by the manufacturer on iOS devices

16 Which Bluetooth attack involves sending unsolicited messages (often vCards or images) to a Bluetooth-enabled device?

A. Blueborne
B. Bluebugging
C. Bluejacking
D. Bluesnarfing

17 Which Bluetooth attack allows an attacker to steal data (contacts, calendars, emails) from a device?

A. Bluesnarfing
B. Bluejacking
C. Pairing Spoofing
D. Frequency Hopping

18 Which tool is commonly used to automate the detection and exploitation of SQL injection flaws?

A. Aircrack-ng
B. John the Ripper
C. sqlmap
D. Hydra

19 What does a 'Union-based' SQL injection allow an attacker to do?

A. Combine the results of the original query with the results of a malicious injected query
B. Shut down the database server
C. Encrypt the database contents
D. Delete the database schema

20 Which social engineering attack targets mobile users via SMS messages containing malicious links?

A. Whaling
B. Vishing
C. Phishing
D. Smishing

21 In the context of browser exploitation, what is a 'hook'?

A. A hardware keylogger
B. A phishing email subject line
C. A script that binds the victim's browser to the attacker's framework (e.g., BeEF)
D. A method to close the browser remotely

22 Which mitigation technique involves generating a unique random token for every user session and validating it with every state-changing request to prevent CSRF?

A. Turning off Cookies
B. Database Encryption
C. Input Sanitization
D. Anti-CSRF Token (Synchronizer Token Pattern)

23 What is 'Bluebugging'?

A. Jamming a Bluetooth signal
B. Scanning for Bluetooth devices
C. Sending a virus via Bluetooth
D. Taking full control of a Bluetooth device to make calls or listen to conversations

24 Which vulnerability allows an attacker to inject malicious code into a website that is then executed by other users?

A. XXE
B. XSS
C. RCE
D. SSRF

25 Which COPE deployment model stands for?

A. Computer Operated, Private Encryption
B. Corporate Owned, Personally Enabled
C. Corporate Owned, Public Enabled
D. Company Operated, Public Entry

26 Which type of malware disguises itself as legitimate software to trick the user into installing it?

A. Trojan Horse
B. Keylogger
C. Logic Bomb
D. Worm

27 What is the primary risk associated with 'Side-Loading' apps on Android?

A. It bypasses the official app store security checks, increasing malware risk
B. It automatically deletes system files
C. It requires root access
D. It slows down the internet connection

28 Which attack involves an attacker creating a fake mobile transmission tower to intercept mobile traffic?

A. NFC Replay
B. Rogue Access Point
C. IMSI Catcher (Stingray)
D. Evil Twin

29 Identify the vulnerability: An application allows uploading a file named shell.php without validating the file type.

A. Path Traversal
B. XSS
C. SQL Injection
D. Unrestricted File Upload

30 Which component is essential for a 'Reflected XSS' attack to succeed?

A. Social engineering to trick a user into clicking a crafted link
B. Access to the database
C. A stored comment on a blog
D. Root access to the server

31 What does the 'SameSite' cookie attribute helps prevent?

A. Buffer Overflows
B. CSRF (Cross-Site Request Forgery)
C. SQL Injection
D. Password Cracking

32 Which of the following is a symptom of a mobile device being infected with spyware?

A. Screen becomes brighter
B. Faster performance
C. Unexpected high data usage and rapid battery drain
D. Improved battery life

33 Reverse engineering an Android app (APK) is often used in penetration testing to:

A. Upgrade the Android OS
B. Identify hardcoded API keys and logic vulnerabilities
C. Increase the app's speed
D. Compress the file size

34 Which attack involves overlaying a legitimate application with a fake window to trick users into entering sensitive data on a mobile device?

A. SIM Swapping
B. Bluejacking
C. Tapjacking / Overlay Attack
D. Rooting

35 In SQL Injection, what is the purpose of the -- or # characters?

A. To execute the query immediately
B. To start a new table
C. To encrypt the payload
D. To comment out the rest of the original SQL query

36 Which of the following represents a 'Blind' SQL Injection scenario?

A. The application crashes the server immediately
B. The application does not return data but behaves differently (true/false) based on the injection
C. The application returns the full database error message
D. The application returns the results of the UNION SELECT query on the screen

37 Which mobile vulnerability involves an app accidentally sharing access to its components (Activities, Services) with other malicious apps?

A. Broken Cryptography
B. Improper Platform Usage (Exported Components)
C. Client Code Quality
D. Insecure Data Storage

38 What is 'Vishing'?

A. Virtual Phishing
B. Video Phishing
C. VPN Phishing
D. Voice Phishing (using phone calls)

39 Which technique is used to bypass mobile device screen locks using residues left by fingers?

A. Smudge Attack
B. Rainbow Table
C. Dictionary Attack
D. Brute Force

40 Which of the following is a valid method to secure a session ID?

A. Storing it in a public folder
B. Storing it in the URL
C. Regenerating the Session ID after a successful login
D. Using a short, predictable sequence

41 Malware that encrypts a user's files and demands payment for the decryption key is known as:

A. Ransomware
B. Rootkit
C. Adware
D. Spyware

42 In the context of malware, what is a 'Wrapper' or 'Binder'?

A. A type of antivirus
B. A tool used to combine a malicious executable with a legitimate file
C. A firewall rule
D. A secure coding standard

43 What is the function of a C2 (Command and Control) server in a malware attack?

A. To issue instructions to compromised devices (botnet) and receive stolen data
B. To validate SSL certificates
C. To prevent DDOS attacks
D. To store the company's backups

44 Which encoding is often used in XSS payloads to bypass basic keyword filters (e.g., converting < to %3C)?

A. URL Encoding (Percent Encoding)
B. Rot13
C. MD5
D. Base64

45 What is 'Session Fixation'?

A. The server crashing due to too many sessions
B. An attacker stealing a session cookie via XSS
C. Fixing a broken session link
D. An attacker setting a user's session ID to a known value before the user logs in

46 Which tool is specifically designed for decompiling Android applications into readable Java source code?

A. Nmap
B. Wireshark
C. Jadx / APKTool
D. Metasploit

47 If an attacker inputs admin' -- into a login field, they are attempting to bypass authentication via:

A. Path Traversal
B. SQL Injection
C. Cross-Site Scripting
D. Buffer Overflow

48 Which of the following is an example of a Social Engineering attack utilizing authority?

A. A brute force attack on a password
B. Scanning ports on a server
C. Injecting SQL code
D. An attacker pretending to be the CEO asking for an urgent wire transfer

49 What defines a 'Hybrid' mobile application?

A. It runs only on iOS
B. It is a web application wrapped in a native container
C. It is written purely in Assembly language
D. It runs only on Android

50 Which mathematical concept is primarily compromised when an attacker successfully performs a 'Integer Overflow' attack on a web application?

A. Confidentiality
B. Network Latency
C. Data Integrity / Correctness of calculation
D. Bandwidth