Learn more about hidden form fields in our tip, Don't hide sensitive information in hidden form fields.
Back to quiz
2.) The correct answer is: d. path traversal attacks
Learn more in our tip, Protect your Web site against path traversal attacks.
Back to quiz
3.) The correct answer is: d. All of the above
Learn more about improper error handling in this tip.
Back to quiz
4.) The correct answer is: b. False
Learn more about cache-control in our tip, How to prevent the risks of client-side caching
Back to quiz
5.) The correct answer is: a. Client-side data validation
Learn more in our tip, How to prevent the risks of client-side caching
Back to quiz
6.) The correct answer is: cross-site scripting
Read the definition of cross-site scripting.
Back to quiz
7.) The correct answer is: b. False
Learn more about keylogger attacks in our tip, How to detect and prevent keylogger attacks.
Back to quiz
8.) The correct answer is: c. SQL injection
Read the definition of SQL injection.
Back to quiz
9.) The correct answer is: d. All of the above
Learn more in our tip, What is spyware? The definition dilemma.
Back to quiz
10.) The correct answer is: a. True
Learn more about manipulating Web application variables in this expert response.
This was first published in January 2006
Security Management Strategies for the CIO