OWASP: Avoiding Hacker Tricks
Review Questions:
1. Which of the following are advantages that attackers have? (Choose all that
apply)
A. They can attack at a strong point
B. They can choose the weakest point
C. They can probe for new exploits
D. They can attack at will
2. True or False: Neither code injection nor cross-site scripting occur in the client
application.
A. True
B. False
3. True or False: Cross-site scripting allows hackers to run malicious script in a
client's web browser.
A. True
B. False
4. Which of the following HTML tags can be embedded? (Choose all that apply)
A. <script>
B. <embed>
C. <code>
D. <applet>
5. True or False: Insecure direct object reference occurs when a direct reference to
a file, directory, etc. is exposed to a user.
A. True
B. False
6. Which of the following are important files that an attacker can access on the
server? (Choose all that apply)
A. Web.config
B. SAM file
C. Seattle.txt
D. HTTP file
7. Which of the following are steps toward preventing integer overflow? (Choose all
that apply)
A. Validate user input
B. Enter the right input
C. Use correct data type
D. Execute your code in a checked context
8. What percentage of computer users fall victim to cybercrime in their lifetimes?
A. 56%
B. 92%
C. 69%
D. 49%
9. True or False: Using cryptography is an element of secure coding.
A. True
B. False
10. Which of the following are common threats? (Choose all that apply).
A. Information disclosure
B. Identity hijacking
C. Buffer overflows
D. Query string manipulation
11. SQL injection does which of the following? (Choose all that apply)
A. Affects dynamic SQL queries
B. Submits data containing an SQL command
C. Affects client-side script
D. Exploits the trust a site has in a user's browser
12. True or False: SQL injection cannot be used to bypass authorization.
A. True
B. False
13. True or False: Integer overflow occurs when a calculation causes an integer to
exceed the max value allowed by its data type.
A. True
B. False
Answer Key:
1. B, C, D
Choosing the weakest point, probing for new exploits, and attacking at will are all
advantages that attackers have.
2. B
This statement is false.
3. A
True. Cross-site scripting allows hackers to run malicious script in a client's web
browser.
4. A, B, C, D
All of these are HTML tags that can be embedded.
5. A
True. Insecure direct object reference occurs when a direct reference to a file,
directory, etc. is exposed to user.
6. A, B
The Web.config and SAM file are important files that an attacker can access on
the server.
7. A, C, D
Validating user input, using the correct data type, and executing your code in a
checked context are steps toward preventing integer overflow.
8. C
69% of computer users fall victim to cybercrime in their lifetimes.
9. A
True. Using cryptography is an element of secure coding.
10. A, B, C, D
All of these are common threats.
11. A, B, C
SQL injection affects dynamic SQL queries, submits data containing an SQL
command, and affects client-side script.
12. B
This statement is false.
13. A
True. Integer overflow occurs when a calculation causes an integer to exceed the
max value allowed by its data type.