We use cookies on this site in order to make it works, and for the traffic analysis.
You can refuse or configure cookies by purposes.
Another message from the Google Adsense consent management platform will ask you for your choices relating to the use of your personal data via cookies for advertising.
We thank you to accept cookies which makes this site work.

Test Cybersécurité

1337

mandatory answer

Question 1

Prénom et Nom

mandatory answer

Question 2

How is user authentication maintained across pages in a web application?

uncheck

mandatory answer

Question 3

Input validation should be based on....

uncheck

mandatory answer

Question 4

On HTTP protocol, which of the following data can't be easily modified by the end user ?

uncheck

mandatory answer

Question 5

What is the type of flaw that occurs when untrusted user entered data is sent to the interpreter as part of a query or command?

uncheck

mandatory answer

Question 6

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

uncheck

mandatory answer

Question 7

For every link or form which invoke state-changing functions with an unpredictable token for each user what attack can be prevented?

uncheck

mandatory answer

Question 8

What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?

uncheck

mandatory answer

Question 9

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites ?

uncheck

mandatory answer

Question 10

An attack technique that forces a user’s session credential or session ID to an explicit value

uncheck

mandatory answer

Question 11

Your application sets a cookie with Secure attribute. What does this mean?

uncheck

mandatory answer

Question 12

Which of the following is used to prevent Clickjacking?

uncheck

mandatory answer

Question 13

Your web page includes advertising JavaScript from a third-party service. Is it safe to assume that problems like XSS, caused by this third-party JavaScript, is not technically possible on your web page?

uncheck

mandatory answer

Question 14

All SQL queries can be made safe using prepared statements?

uncheck

mandatory answer

Question 15

Placing user submitted data into a typical HTML document is always safe (XSS-wise) if you escape HTML specific characters: <, >, '&, ', " from the user input? Ie. you use htmlspecialchars() funtion in PHP

uncheck

mandatory answer

Question 16

You concatenate and hash two inputs, input1 and input2, with SHA-256 algorithm. Is it possible that the order of the inputs fed to the SHA-256 function may have a direct effect regarding security of the hashing?
sha256(input1 . input2) vs. sha256(input2 . input1)

uncheck

mandatory answer

Question 17

What is a FQDN?

uncheck

mandatory answer

Question 18

What is 802.1Q?

uncheck

mandatory answer

Question 19

What is "SYN, SYN-ACK, ACK"?

uncheck

mandatory answer

Question 20

On which of the following protocols an IP spoofing attack is easy to perform?

uncheck

mandatory answer

Question 21

Which extensible authentication protocol type requires client-side certificates?

uncheck

mandatory answer

Question 22

Which statement regarding Mac Address Control is true?

uncheck

mandatory answer

Question 23

What is the primary function of Spanning Tree (choose the best answer)?

uncheck

mandatory answer

Question 24

Which of these protocols is used for carrying authentication, authorization, and accounting information between a network access server and a shared authentication server ?

uncheck

mandatory answer

Question 25

In a public key infrastructure, what is a CRL?

uncheck

mandatory answer

Question 26

RSA is a :

uncheck

mandatory answer

Question 27

How many hosts can contain the following network : 172.20.50.8/28

uncheck

mandatory answer

Question 28

What is Diffie-Hellman?

uncheck

mandatory answer

Question 29

What is pass-the-hash ?

uncheck

mandatory answer

Question 30

What does IAAS stands for ?

uncheck

mandatory answer

Question 31

Which protocols are often used to implement identity federation / SSO on software as as service applications ?

uncheck

mandatory answer

Question 32

What is GIT ?

uncheck



You too, create your online questionnaire!
It's free and easy.
Let's go!