Unit4 - Subjective Questions

INT245 • Practice Questions with Detailed Answers

1

Explain the significance of the OWASP Top 10 in the context of web application penetration testing. Briefly describe any three vulnerabilities listed in the current OWASP Top 10.

2

Differentiate between Reflected XSS, Stored XSS, and DOM-based XSS attacks.

3

Describe the mechanism of a SQL Injection (SQLi) attack. Provide a theoretical example of how an authentication bypass might occur using SQLi.

4

What is Session Hijacking? Explain the difference between Session Sniffing and Session Fixation.

5

Define Cross-Site Request Forgery (CSRF) and explain how attackers craft such requests.

6

Discuss the various Mobile Device Deployment Models used in enterprise environments and their security implications.

7

How can a penetration tester identify SQL Injection vulnerabilities in a web application? List three common techniques.

8

Explain the concept of Blind SQL Injection and distinguish it from In-band SQL Injection.

9

Compare Bluejacking, Bluesnarfing, and Bluebugging in the context of Bluetooth hacking.

10

What are the primary security risks associated with Jailbreaking (iOS) or Rooting (Android) mobile devices from a corporate perspective?

11

Describe Social Engineering attacks. Explain Phishing, Vishing, and Smishing.

12

Explain the methodology used for Exploiting Browsers during a penetration test. What is the role of frameworks like BeEF?

13

What is Insecure Direct Object Reference (IDOR)? Provide an example of how it can be exploited.

14

Detail the phases of Mobile Device Exploitation using malware. What are the common types of mobile malware?

15

In the context of SQL Injection, explain the UNION-based attack strategy.

16

What is Security Misconfiguration in web applications? How does it aid attackers?

17

Describe the Man-in-the-Browser (MitB) attack. How does it differ from a standard Man-in-the-Middle (MitM) attack?

18

List and explain five mitigation strategies for Mobile Device Security in an enterprise.

19

Explain Broken Authentication vulnerabilities. How can attackers exploit them and how can they be prevented?

20

Derive the logic behind a Boolean-based Blind SQL Injection attack using the example of a login page.