Complete Questions with Correct
Answers Updated
2025/2026||Already Graded!!! 100%
Guaranteed Pass
What is a hashing algorithm?
A utility designed to create a binary or hexadecimal number that
represents the uniqueness of a data set, such as a file or entire disk
A form of one way encryption
C)Both A and B
D)Answer is not supplied - ANSWER ✓ Both A and B
(B3, Pg22) What is considered a good hashing encryption algorithm?
MD5
SHA1
SHA2
D)None of the above - ANSWER ✓ SHA2
(B3, Pg142) What is a command injection? - ANSWER ✓ A flaw in a web
application that takes advantage in how a web application process user input
(B3, Pg148) What is the best way to mitigate a Command Injection? - ANSWER
✓ To program the web application without a third party entity and to sanitize the
user input
(B3, Pg150) What is a file inclusion attack? - ANSWER ✓ A result of adding
resources on a page based on user input
,(B3, Pg151) What is the best way to mitigate a file inclusion attack? - ANSWER ✓
The best way to avoid being vulnerable to this attack is to avoid dynamically
adding files based on user input
(B3, Pg154) What is a Cross Site Scripting Attack? - ANSWER ✓ A client side
attack that targets users that are browsing the site. Typically occurs in areas of the
site where users input information
(B3, Pg156) How do you mitigate a Cross Site Scripting Attack? - ANSWER ✓ To
sanitize the user input and to use a 3rd party library and not implement your own
filter
(B3, Pg157) What is an SQL injection attack? - ANSWER ✓ A type of injection
attack wherein the attacker exploits the web application to send unauthorized
commands to a backend database server
(B3, Pg158) How do you mitigate SQL? - ANSWER ✓ It is to not use an insecure
method of passing queries to the database
(B3, Pg162) What is a Session Guessing attack? - ANSWER ✓ Where an attacker
guesses a Session Token and logs into a site under your information
(B3, Pg163) What is the best way to mitigate a Session Guessing attack? -
ANSWER ✓ To use truly random session tokens that expire
(B3, Pg164) What is a clickjacking attack? - ANSWER ✓ Where a user can be
tricked into clicking on something without realizing that they did
(B3, Pg168) How do you mitigate a clickjacking attack? - ANSWER ✓ Make sure
that the web server itself sends the X-Frame Options header in the HTTP response
What are the three values within a X-Frame Options header in an HTTPS
response? - ANSWER ✓ Deny, Same Origin, and Allow-FROM
(B3, Pg169) What is a Cross Site Request Forgery (CSRF)? - ANSWER ✓ Where
a user uses unauthorized commands submitted from a user that the web application
trusts
,(B3, Pg170) How do you mitigate a Cross Site Request Forgery?
Make sure every HTTP request submitting a form or any other kind of
input comes from the same origin
Use a Cross Site Request Forgery Token which is required by every form
or input on a site
Both A and B
None of the above - ANSWER ✓ Both A and B
(B3, Pg170-171) Where should the CSRF tokens be located in to keep a user's
session from being vulnerable? - ANSWER ✓ The POST Request
(B3, Pg172) What is a directory traversal attack? - ANSWER ✓ A directory
traversal attack is an injection of directory code to try and navigate to a specific
directory / file on a computer
(B3, Pg172) What is the Directory Traversal vulnerability used for? - ANSWER ✓
To read sensitive data within the web application
(B3, Pg173) What is the best way to mitigate directory traversal attack? -
ANSWER ✓ It is to not use user input when making file system calls
(B3, Pg175) What is a File Upload Vulnerability? - ANSWER ✓ A flaw where the
user can upload an arbitrary file to the server and then visit it to execute code
(B3, Pg179) What is used to test web applications?
NMAP
A scanner
A Vulnerability Scanner
Nothing - ANSWER ✓ A Vulnerability Scanner
When would you go public with a vulnerability found within a business website?
After a patch was released
Before the patch is released, after you have discussed it with the business
Before you tell the business and you go public immediately
, Never and use it for your own exploits - ANSWER ✓ After the patch was
released
(B3, Pg186) What is Integer Overflow? - ANSWER ✓ Program assumes that a
value is always positive, overflow makes signed integer wrap and become negative
(B3, Pg190) What is the return pointer?
Where the CPU returns to after completing a function
Where the CPU goes to next after completing a function
Where the CPU goes to after all functions are completed
Where the pointer is - ANSWER ✓ Where the CPU goes to next after
completing a function
(B3, Pg202) What is a stack canary? - ANSWER ✓ It is a value that sits before the
return pointer of the stack.
(B3, Pg202) What is Address Space Layout Randomization(ASLR)? - ANSWER
✓ A protection that involves randomizing the Memory address that a program gets
loaded into each run
(B3, Pg205) What is a Format String Vulnerability? - ANSWER ✓ It occurs when
you run printf in C without a format string
(B3, Pg208) How do you mitigate a Format String Vulnerability? - ANSWER ✓
Never use printf without a format string
(B3, Pg184) What kind of vulnerability is within a FTP Service?
Buffer Overflow
Integer Overflow
Command Injection
Nothing it is completely fine - ANSWER ✓ Buffer Overflow
(B3, Pg227) What is Metasploit? - ANSWER ✓ A penetration testing tool used to
automatically execute exploits against targeted systems
(B3, Pg215) What application is used when running Metasploit?