Application Security Basics
Common Application Threats
Penetration Testing Basics
Secure Development Practices
Real-World Application Security
100

What does “AppSec” stand for?

Application Security

100

What does SQL Injection target in an application?

A database (inserts malicious SQL commands).

100

What is the purpose of penetration testing?

To find weaknesses before real attackers do.

100

Why should developers keep libraries and frameworks updated?

To patch known vulnerabilities in older versions.

100

What does the “S” in HTTPS mean for a website?

Secure (encrypted communication)

200

What is the main goal of application security?

To protect applications from threats and vulnerabilities.

200

What is Cross-Site Scripting (XSS) used for by attackers?

Inject malicious scripts into web pages (steal data, hijack sessions).

200

What is the common nickname for penetration testers who help improve security?

Ethical hackers / white-hat hackers.

200

What is the principle of “least privilege”?

Users get only the minimum access they need.

200

What is the most common reason attackers go after apps?

To steal data or gain unauthorized access.

300

True or False: Every application can be 100% secure forever.

False; Security must be continuously maintained.

300

What does CSRF stand for in security?

Cross-Site Request Forgery

300

Which type of test simulates real hacker attacks to find weaknesses?

Penetration test (or “pen test”).

300

What is input validation used for in apps?

To ensure only valid and safe data is accepted by the app.

300

What is ransomware designed to do?

Encrypt files and demand payment to unlock them.

400

What does the term “vulnerability” mean in an application?

A weakness that attackers can exploit.

400

What is brute-force login attack?

Repeatedly guessing usernames and passwords until access is gained.

400

What does a penetration tester provide at the end of a test?

A report of findings and recommendations.

400

What is code review’s role in security?

To catch security flaws early in code.

400

What global project publishes the “Top 10” list of most critical web app vulnerabilities?

OWASP (Open Web Application Security Project)

500

What is the difference between a bug and a security vulnerability?

A bug affects functionality, a vulnerability affects security.

500

What does “zero-day vulnerability” mean?

A vulnerability unknown to the vendor and without a fix yet.

500

What is the difference between black-box and white-box testing?

Black-box = no knowledge of system, White-box = full knowledge of system.

500

What is the “shift-left” approach in security testing?

Moving security testing earlier in the development lifecycle.

500

If a company suffers a data breach, what’s one immediate step they must take?

Notify affected users and authorities, investigate and patch the breach.

M
e
n
u