Web application security - the fast guide 1.1 | Page 186

Chapter 9 - Secure Application Development P a g e | 186 9.8 QUIZ: 1. What is special about web application security is: a. difficult to protect due to open standards and b. easy to patch due to centralized source situated on the web server c. difficult to protect due to the need of 24/7 availability in most cases. d. All the above. 2. One of the main problems in penetrate and patch approach: a. It is difficult to implement b. It cannot help in solving buffer overflow and cross site scripting c. It is considered as expensive approach because of late patch implementation. d. All the above 3. The usage of security centric approach in web application development will lead to: a. Getting better security due to ability to analyze code in dynamic analysis and black box testing. b. Minimize the overall development cost comparing with late penetrate and patch approach. c. Minimize the time to deliver due to agility and unstructured development process d. All the above 4. Use Microsoft attack surface analyzer (provided in supplementary materials) to enumerate the attack surface of any local web application you select served by the IIS web server on your machine. Main steps are: 1. ensure the "Run new scan" action is selected, confirm the directory and filename you would like the Attack Surface data saved to and click Run Scan. 2. Attack Surface Analyzer then takes a snapshot of your system state and stores this information in a Microsoft Cabinet (CAB) file. This scan is known as your baseline scan. 3. Install your application, enabling as many options as possible and being sure to include options that you perceive may increase the attack surface of the machine. Examples include; if your product can install a Windows Service, includes the option to enable access through the Windows Firewall or install drivers. 4. Run your application.