Unit 4 - Practice Quiz

INT245 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which organization manages the standard awareness document for developers and web application security known as the 'Top 10'?

A. NIST
B. ISO
C. OWASP
D. IEEE

2 In the context of OWASP Top 10, which vulnerability allows an attacker to access unauthorized functionality or data, such as viewing another user's account details by simply changing a URL parameter?

A. Injection
B. Broken Access Control
C. Security Misconfiguration
D. Cryptographic Failures

3 Which attack involves an attacker stealing a valid session ID to gain unauthorized access to a web server?

A. Session Hijacking
B. SQL Injection
C. Directory Traversal
D. Buffer Overflow

4 What is the primary mechanism of a Cross-Site Request Forgery (CSRF) attack?

A. Injecting malicious SQL scripts into a database
B. Tricking a user's browser into sending an unwanted request to a trusted site where the user is authenticated
C. Executing scripts in the victim's browser via a reflected input
D. Brute-forcing the admin password

5 Which input would most likely be used to test for a basic SQL Injection vulnerability?

A. <script>alert(1)</script>
B. ../../etc/passwd
C. ' OR '1'='1
D. ping 127.0.0.1

6 What is the primary defense mechanism against SQL Injection attacks?

A. Using Hashing algorithms
B. Using Parameterized Queries (Prepared Statements)
C. Disabling JavaScript
D. Using SSL/TLS

7 Which type of XSS attack occurs when the malicious script is permanently stored on the target server (e.g., in a database or forum post)?

A. Reflected XSS
B. Stored (Persistent) XSS
C. DOM-based XSS
D. Blind XSS

8 In a DOM-based XSS attack, where does the security vulnerability lie?

A. In the server-side database code
B. In the client-side code (JavaScript) processing data
C. In the network transport layer
D. In the web server configuration

9 Which flag should be set on a Set-Cookie HTTP response header to prevent client-side scripts (like XSS payloads) from accessing the cookie?

A. Secure
B. HttpOnly
C. SameSite
D. Expires

10 BeEF is a popular penetration testing tool. What does the acronym stand for?

A. Browser Exploitation Framework
B. Binary Encryption and Encoding Facility
C. Basic Exploitation Environment Frontend
D. Backend Engineering Exploitation File

11 Which SQL injection technique involves asking the database true/false questions and determining the answer based on the application's response time?

A. Union-based SQLi
B. Error-based SQLi
C. Time-based Blind SQLi
D. Out-of-band SQLi

12 What is the mathematical logic often used in tautology-based SQL injection?

A.
B. where A is false
C. (Always True)
D. (Imaginary)

13 Which mobile deployment model allows employees to use their personal devices for work but requires them to install a Mobile Device Management (MDM) agent?

A. COPE (Corporate Owned, Personally Enabled)
B. BYOD (Bring Your Own Device)
C. CYOD (Choose Your Own Device)
D. Direct Access

14 Which OWASP Mobile Top 10 vulnerability refers to the storage of sensitive data (like passwords or API keys) in plain text within the device's file system?

A. Insecure Data Storage
B. Improper Platform Usage
C. Insecure Communication
D. Extraneous Functionality

15 What is 'Jailbreaking' in the context of mobile security?

A. Escaping a physical prison using a mobile phone
B. Removing software restrictions imposed by the manufacturer on iOS devices
C. Encrypting the file system of an Android device
D. Creating a sandbox environment for apps

16 Which Bluetooth attack involves sending unsolicited messages (often vCards or images) to a Bluetooth-enabled device?

A. Bluesnarfing
B. Bluebugging
C. Bluejacking
D. Blueborne

17 Which Bluetooth attack allows an attacker to steal data (contacts, calendars, emails) from a device?

A. Bluejacking
B. Bluesnarfing
C. Pairing Spoofing
D. Frequency Hopping

18 Which tool is commonly used to automate the detection and exploitation of SQL injection flaws?

A. John the Ripper
B. Hydra
C. sqlmap
D. Aircrack-ng

19 What does a 'Union-based' SQL injection allow an attacker to do?

A. Shut down the database server
B. Combine the results of the original query with the results of a malicious injected query
C. Delete the database schema
D. Encrypt the database contents

20 Which social engineering attack targets mobile users via SMS messages containing malicious links?

A. Phishing
B. Vishing
C. Smishing
D. Whaling

21 In the context of browser exploitation, what is a 'hook'?

A. A phishing email subject line
B. A script that binds the victim's browser to the attacker's framework (e.g., BeEF)
C. A method to close the browser remotely
D. A hardware keylogger

22 Which mitigation technique involves generating a unique random token for every user session and validating it with every state-changing request to prevent CSRF?

A. Anti-CSRF Token (Synchronizer Token Pattern)
B. Input Sanitization
C. Database Encryption
D. Turning off Cookies

23 What is 'Bluebugging'?

A. Jamming a Bluetooth signal
B. Taking full control of a Bluetooth device to make calls or listen to conversations
C. Sending a virus via Bluetooth
D. Scanning for Bluetooth devices

24 Which vulnerability allows an attacker to inject malicious code into a website that is then executed by other users?

A. SSRF
B. XXE
C. XSS
D. RCE

25 Which COPE deployment model stands for?

A. Corporate Owned, Personally Enabled
B. Computer Operated, Private Encryption
C. Company Operated, Public Entry
D. Corporate Owned, Public Enabled

26 Which type of malware disguises itself as legitimate software to trick the user into installing it?

A. Worm
B. Trojan Horse
C. Logic Bomb
D. Keylogger

27 What is the primary risk associated with 'Side-Loading' apps on Android?

A. It slows down the internet connection
B. It bypasses the official app store security checks, increasing malware risk
C. It requires root access
D. It automatically deletes system files

28 Which attack involves an attacker creating a fake mobile transmission tower to intercept mobile traffic?

A. Evil Twin
B. Rogue Access Point
C. IMSI Catcher (Stingray)
D. NFC Replay

29 Identify the vulnerability: An application allows uploading a file named shell.php without validating the file type.

A. Unrestricted File Upload
B. Path Traversal
C. XSS
D. SQL Injection

30 Which component is essential for a 'Reflected XSS' attack to succeed?

A. Access to the database
B. Social engineering to trick a user into clicking a crafted link
C. A stored comment on a blog
D. Root access to the server

31 What does the 'SameSite' cookie attribute helps prevent?

A. SQL Injection
B. CSRF (Cross-Site Request Forgery)
C. Buffer Overflows
D. Password Cracking

32 Which of the following is a symptom of a mobile device being infected with spyware?

A. Improved battery life
B. Faster performance
C. Unexpected high data usage and rapid battery drain
D. Screen becomes brighter

33 Reverse engineering an Android app (APK) is often used in penetration testing to:

A. Increase the app's speed
B. Identify hardcoded API keys and logic vulnerabilities
C. Upgrade the Android OS
D. Compress the file size

34 Which attack involves overlaying a legitimate application with a fake window to trick users into entering sensitive data on a mobile device?

A. Tapjacking / Overlay Attack
B. Bluejacking
C. Rooting
D. SIM Swapping

35 In SQL Injection, what is the purpose of the -- or # characters?

A. To execute the query immediately
B. To comment out the rest of the original SQL query
C. To start a new table
D. To encrypt the payload

36 Which of the following represents a 'Blind' SQL Injection scenario?

A. The application returns the full database error message
B. The application returns the results of the UNION SELECT query on the screen
C. The application does not return data but behaves differently (true/false) based on the injection
D. The application crashes the server immediately

37 Which mobile vulnerability involves an app accidentally sharing access to its components (Activities, Services) with other malicious apps?

A. Insecure Data Storage
B. Improper Platform Usage (Exported Components)
C. Broken Cryptography
D. Client Code Quality

38 What is 'Vishing'?

A. Video Phishing
B. Voice Phishing (using phone calls)
C. Virtual Phishing
D. VPN Phishing

39 Which technique is used to bypass mobile device screen locks using residues left by fingers?

A. Smudge Attack
B. Brute Force
C. Dictionary Attack
D. Rainbow Table

40 Which of the following is a valid method to secure a session ID?

A. Storing it in the URL
B. Using a short, predictable sequence
C. Regenerating the Session ID after a successful login
D. Storing it in a public folder

41 Malware that encrypts a user's files and demands payment for the decryption key is known as:

A. Spyware
B. Adware
C. Ransomware
D. Rootkit

42 In the context of malware, what is a 'Wrapper' or 'Binder'?

A. A tool used to combine a malicious executable with a legitimate file
B. A firewall rule
C. A type of antivirus
D. A secure coding standard

43 What is the function of a C2 (Command and Control) server in a malware attack?

A. To store the company's backups
B. To issue instructions to compromised devices (botnet) and receive stolen data
C. To validate SSL certificates
D. To prevent DDOS attacks

44 Which encoding is often used in XSS payloads to bypass basic keyword filters (e.g., converting < to %3C)?

A. Base64
B. URL Encoding (Percent Encoding)
C. Rot13
D. MD5

45 What is 'Session Fixation'?

A. An attacker stealing a session cookie via XSS
B. An attacker setting a user's session ID to a known value before the user logs in
C. The server crashing due to too many sessions
D. Fixing a broken session link

46 Which tool is specifically designed for decompiling Android applications into readable Java source code?

A. Wireshark
B. Jadx / APKTool
C. Nmap
D. Metasploit

47 If an attacker inputs admin' -- into a login field, they are attempting to bypass authentication via:

A. Buffer Overflow
B. SQL Injection
C. Path Traversal
D. Cross-Site Scripting

48 Which of the following is an example of a Social Engineering attack utilizing authority?

A. An attacker pretending to be the CEO asking for an urgent wire transfer
B. A brute force attack on a password
C. Scanning ports on a server
D. Injecting SQL code

49 What defines a 'Hybrid' mobile application?

A. It runs only on Android
B. It runs only on iOS
C. It is a web application wrapped in a native container
D. It is written purely in Assembly language

50 Which mathematical concept is primarily compromised when an attacker successfully performs a 'Integer Overflow' attack on a web application?

A. Confidentiality
B. Data Integrity / Correctness of calculation
C. Network Latency
D. Bandwidth