New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which HTTP header is used by the CORS (Cross-origin resource sharing) standard to control access to resources on a server?

A.

Access-Control-Request-Method

B.

Access-Control-Request-Headers

C.

Access-Control-Allow-Headers

D.

None of the above

Which of the following attributes is NOT used to secure the cookie?

A.

HttpOnly

B.

Secure

C.

Restrict

D.

Same-Site

Salt is a cryptographically secure random string that is added to a password before it is hashed. In this context, what is the primary objective of salting?

A.

To defend against dictionary attacks or attacks against hashed passwords using a rainbow table.

B.

To slow down the hash calculation process.

C.

To generate a long password hash that is difficult to crack.

D.

To add a secret message to the password hash.

In the context of the following JWT token, which of the following statement is true?

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.ey

JUYW1I1joiU2vjbB3ZiNo_mn0vNWT4G1-

ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8

A.

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9 represents a JWT Signature.

B.

mn0vNWT4G1-ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8 represents a JWT Signature.

C.

eyJUYW1I1joiU2vjbB3ZiNo represents a JWT Signature.

D.

None of the above.

Which of the following HTTP response header prevents the client from caching the HTTP response in the most secure manner?

A.

Cache-Control: no-cache, no-store

B.

Secure-Cache: Enabled

C.

Cache-Control: Private

D.

Content-Security-Policy: no-cache, no-store

Which of the following is considered as a safe password?

A.

Monday@123

B.

abcdef

C.

Sq0Jh819%ak

D.

1234567890

An application’s forget password functionality is described below:

The user enters their email address and receives a message on the web page:

“If the email exists, we will email you a link to reset the password”

The user also receives an email saying:

“Please use the link below to create a new password:”

http://example.com/reset_password?userId=5298

Which of the following is true?

A.

The reset link uses an insecure channel

B.

The application is vulnerable to username enumeration

C.

The application will allow the user to reset an arbitrary user’s password

D.

Both A and C

In the context of NoSQL injection, which of the following is correct?

Statement A: NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational constraints and consistency checks, NoSQL databases often offer performance and scaling benefits. Yet these databases are still potentially vulnerable to injection attacks, even if they aren’t using the traditional SQL syntax.

Statement B: NoSQL database calls are written in the application’s programming language, a custom API call, or formatted according to a common convention (such as XML, JSON, LINQ, etc).

A.

A is true, and B is false

B.

A is false, and B is true

C.

Both A and B are false

D.

Both A and B are true