QUESTIONS AND ANSWERS | 2025/2026
UPDATE | WESTERN GOVERNOR'S
UNIVERSITY!!
1 of 69
Definition
validate()
Give this one a try later!
Which Python function is used to
protect against log injection invalidate()
attacks?
compress() compare()
, Don't know?
2 of 69
Definition
API related errors
Give this one a try later!
Status code 401 is
common with? Broken access control
Least Privilege Permission Levels 400 - Bad Request
Don't know?
3 of 69
Definition
Content-Type (header)
Give this one a try later!
User-Agent (header) Accept (header)
What type of content
Response.content the server will
respond with
, Don't know?
4 of 69
Definition
SQL Injection
Give this one a try later!
Exploiting query
Clickjacking parameters is an example
of what attack?
Cross Site Scripting (XSS) Xml Injection
Don't know?
5 of 69
Definition
MSAL
Give this one a try later!
Which protocol
caches a token after ACL
it has been acquired?
, OAUTH SAML
Don't know?
6 of 69
Definition
eval()
Give this one a try later!
Which Python
function is prone to a acos()
potential code
injection attack?
help(http) exec()
Don't know?
7 of 69
Definition
Cross Site Scripting (XSS)
Give this one a try later!
Denial Of Service (dos) Social engineering