-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathtest_answer.json
1 lines (1 loc) · 3.75 KB
/
test_answer.json
1
{"Defensive Coding for JavaScript and HTML5": {"Question: Which of the following are the main considerations for secure use of HTML5 Web Workers?": ["9cceeae4-4bcb-11e7-b53a-4439c4509962", "9cceeae1-4bcb-11e7-b53a-4439c4509962"], "Question: How can you help prevent Document Object Model or DOM-based Cross-Site Scripting attacks?": "89db3ba2-4bcb-11e7-b53a-4439c4509962", "Question: Match the threats with the corresponding web site attack methods.": {"Cross-Site Request Forgery": ["Can be executed when there is a state change in the web site", "Can trigger user into uploading data to the web server", "Can be used to changing personal data"], "Cross-Site Scripting": ["Can be used to inject malicious code", "Can be executed where users enter text that is displayed to others", "Can be used to change cookie settings"]}, "Question: Which of the following potential vulnerabilities do arise because of the Document Object Model or DOM?": ["95e33834-4bcb-11e7-b53a-4439c4509962", "95e33831-4bcb-11e7-b53a-4439c4509962", "95e33833-4bcb-11e7-b53a-4439c4509962"], "Question: Which of the following are the main precautions should you take to prepare secure HTML5 code?": ["9de256b4-4bcb-11e7-b53a-4439c4509962", "9de256b6-4bcb-11e7-b53a-4439c4509962", "9de256b2-4bcb-11e7-b53a-4439c4509962", "9de256b7-4bcb-11e7-b53a-4439c4509962", "9de256b5-4bcb-11e7-b53a-4439c4509962"], "Question: Which of the following statements summarize information and trust issues for JavaScript and HTML5 development?": ["8c7ce892-4bcb-11e7-b53a-4439c4509962", "8c7ce891-4bcb-11e7-b53a-4439c4509962"], "Question: Which of the following defensive programming steps can you take to mitigate Cross-Origin Resource Sharing or CORS attacks?": ["9af98ea1-4bcb-11e7-b53a-4439c4509962", "9af98ea5-4bcb-11e7-b53a-4439c4509962", "9af98ea2-4bcb-11e7-b53a-4439c4509962", "9af98ea3-4bcb-11e7-b53a-4439c4509962"], "Question: How can you best help prevent Document Object Model or DOM-based social jacking attacks?": "8aef6ac4-4bcb-11e7-b53a-4439c4509962"}, "Defensive Coding, APIs, and Security": {"Question: Which of the following is the only robust and virtually guaranteed solution to protect Scalable Vector Graphics or SVG code?": "93ade1a0-4bcb-11e7-b53a-4439c4509962", "Question: Why is JSON.parse preferable to eval for converting JavaScript Object Notation or JSON text into a JavaScript object?": ["99d84021-4bcb-11e7-b53a-4439c4509962", "99d86730-4bcb-11e7-b53a-4439c4509962"], "Question: What can a developer do to alleviate the threat of malicious browser plugins?": ["916ccb42-4bcb-11e7-b53a-4439c4509962", "916ccb41-4bcb-11e7-b53a-4439c4509962"], "Question: Page manipulation attacks through cascading style sheets or CSS can be prevented in the same way as which other attacks?": "8fbc8330-4bcb-11e7-b53a-4439c4509962", "Question: Which of the following attributes would always be recommended for any implementation of iframe sandbox ?": "929b3922-4bcb-11e7-b53a-4439c4509962", "Question: Which type of third-party application program interface or API is most vulnerable to cross-site scripting?": "8e9b0da3-4bcb-11e7-b53a-4439c4509962", "Question: What is the most common way of executing Document Object Model or DOM manipulation?": "8d8271b2-4bcb-11e7-b53a-4439c4509962", "Question: Select the key features of JavaScript Object Notation or JSON hacking.": ["980c0ba0-4bcb-11e7-b53a-4439c4509962", "980be492-4bcb-11e7-b53a-4439c4509962"], "Question: Select the key features of JavaScript Object Notation or JSON.": ["96f9b144-4bcb-11e7-b53a-4439c4509962", "96f9d850-4bcb-11e7-b53a-4439c4509962", "96f9b141-4bcb-11e7-b53a-4439c4509962", "96f9b143-4bcb-11e7-b53a-4439c4509962"], "Question: Which of the following methods can be used to protect JavaScript code from an attack?": ["94c285f4-4bcb-11e7-b53a-4439c4509962", "94c285f3-4bcb-11e7-b53a-4439c4509962"]}}