Question 1 Which two functions are provided by a web proxy device? (Choose two.) check_box_outline_blank caching of HTTP messages check_box_outline_blank scanning a web server for related contents check_box_outline_blank translating HTTP me
Here are the answers to the questions provided:
### Question 1
**Which two functions are provided by a web proxy device? (Choose two.)**
- **caching of HTTP messages**
- **enabling HTTP transfers across a firewall**
### Question 2
**Match the HTTP status code contained in a web server response to the description.**
- codes in the 200 range: **C** (related to successful transactions)
- codes in the 300 range: **A** (related to HTTP redirections)
- codes in the 400 range: **B** (related to client errors)
- codes in the 500 range: **D** (related to server errors)
- codes in the 100 range: **E** (informational)
### Question 3
**Match the elements in the URL ftp://xyz-company.com:2457/support/file;id=65?name=intro&r=true to the description.**
- xyz-company.com: **F** (host)
- 2457: **B** (port)
- support/file: **D** (path)
- ftp: **A** (scheme)
- name=intro&r=true: **E** (query-string)
- id=65: **C** (path-segment-params)
### Question 4
**Which function is provided by HTTP 2.0 to improve performance over HTTP 1.1?**
- **HTTP 2.0 provides HTTP message multiplexing and requires fewer messages to download web content.**
### Question 5
**Why should application developers change the session ID names used by common web application development frameworks?**
- **These session ID names can be used to fingerprint the application framework employed.**
### Question 6
**Which mechanism is used by the shopping site to securely maintain user authentication during shopping?**
- **session ID**
### Question 7
**What is the best mitigation approach against session fixation attacks?**
- **Ensure that the session ID is used after a user completes authentication.**
### Question 8
**Which two attributes can be set in a web application cookie to indicate it is a persistent cookie? (Choose two.)**
- **Expires**
- **Max-Age**
### Question 9
**Which international organization is dedicated to educating industry professionals, creating tools, and evangelizing best practices for securing web applications and underlying systems?**
- **Open Web Application Security Project (OWASP)**
### Question 10
**Which component in the statement below is most likely user input on a web form?**
- **network**
### Question 11
**Which statement describes an example of an out-of-band SQL injection attack?**
- **An attacker launches the attack on a web site and forces the web application to send the query results via an email.**
### Question 12
**What type of SQL injection attack is the threat actor using?**
- **blind**
### Question 13
**Which technique exploits the SQL injection vulnerability on the web application?**
- **Union operator**
### Question 14
**Which type of SQL query is in the SQL statement select * from users where user = "admin";?**
- **static query**
### Question 15
**Which type of penetration testing can be used to verify the proper configuration of the Active Directory service?**
- **LDAP injection**
### Question 16
**What is a potentially dangerous web session management practice?**
- **including the session ID in the URL**
### Question 17
**What is the effect of the HTTPOnly flag?**
- **It forces the web browser to have the cookies processed only by the server.**
### Question 18
**Which threat does this policy mitigate?**
- **Default credential attack**
### Question 19
**Which type of vulnerability does the attacker try to exploit?**
- **HTTP parameter pollution**
### Question 20
**Where would the tester use the string for testing XSS vulnerabilities?**
- **in a user input field in a web form**
### Question 21
**According to OWASP, which three statements are rules to prevent XSS attacks? (Choose three.)**
- **Use HTML escape before inserting untrusted data into HTML element content.**
- **Use attribute escape before inserting untrusted data into HTML common attributes.**
- **Use JavaScript escape before inserting untrusted data into JavaScript data values.**
### Question 22
**Which type of web vulnerability is being exploited by the attacker?**
- **directory traversal**
### Question 23
**Which type of vulnerability did the attacker try to exploit?**
- **remote file inclusion**
### Question 24
**What insecure code practice enabled this catastrophic threat?**
- **use of hard-coded credentials**
### Question 25
**What is the best practice to mitigate the vulnerabilities from a lack of proper error handling in an application?**
- **Use a well-thought-out scheme to provide meaningful error messages to the users but no useful information to an attacker.**
These answers reflect best practices and known security principles related to web applications and security testing.