NSCT – Web Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Web security refers to: (A) Structuring HTML (B) Styling web pages (C) Protecting websites, web applications, and users from cyber threats and attacks (D) Optimizing CPU onlyShow All Answers 2. . HTTPS is used to: (A) Optimize CPU only (B) Style HTML elements (C) Secure data transmission using encryption (SSL/TLS) (D) Structure CSS 3. . XSS (Cross-Site Scripting) attacks occur when: (A) Users cannot access a page (B) Malicious scripts are injected into a web page viewed by users (C) CPU is overloaded (D) CSS is modified 4. . SQL Injection attacks occur when: (A) Malicious SQL queries are inserted into input fields to manipulate the database (B) CSS grids fail (C) JavaScript is blocked (D) HTML tags are removed 5. . CSRF (Cross-Site Request Forgery) is: (A) A JavaScript error (B) A styling error (C) An attack that tricks a user into executing unwanted actions on a web application (D) A database error only 6. . Content Security Policy (CSP) helps to: (A) Optimize CPU (B) Style web pages (C) Structure HTML only (D) Prevent XSS and other code injection attacks 7. . Input validation is important because: (A) Only styles CSS (B) Only structures HTML (C) It prevents malicious data from entering the system (D) Optimizes CPU only 8. . Password hashing ensures: (A) CPU optimization only (B) Styling elements (C) Optimizing CSS (D) Passwords are stored in an encrypted form to prevent unauthorized access 9. . Two-factor authentication (2FA) adds: (A) Only HTML validation (B) Only styling (C) An additional layer of security beyond username and password (D) CPU optimization only 10. . HTTPS uses which protocol for encryption? (A) SSL/TLS (B) FTP (C) HTTP only (D) SMTP 11. . Session hijacking refers to: (A) Styling errors (B) An attacker taking over a user’s session to gain unauthorized access (C) HTML structure errors (D) CSS grid issues 12. . Secure cookies are: (A) Optimized CPU scripts (B) CSS classes (C) HTML elements (D) Cookies that can only be transmitted over HTTPS 13. . Security headers like X-Frame-Options help to: (A) Optimize CPU (B) Style web pages (C) Structure HTML only (D) Prevent clickjacking attacks 14. . Rate limiting is used to: (A) Style elements (B) Optimize CSS (C) Prevent brute-force attacks by limiting request frequency (D) Structure HTML only 15. . HTTPS protects against: (A) CPU optimization only (B) Styling issues only (C) HTML errors (D) Data interception, eavesdropping, and man-in-the-middle attacks 16. . Cross-Origin Resource Sharing (CORS) is used to: (A) Structure CSS grids (B) Style HTML elements (C) Control which domains can access resources on a server (D) Optimize CPU only 17. . Input sanitization helps to: (A) Remove or escape harmful characters from user input (B) Style web pages (C) Structure HTML (D) Optimize CPU only 18. . Web Application Firewalls (WAFs) are used to: (A) Structure HTML (B) Optimize CPU only (C) Protect web applications from attacks like SQL injection, XSS, and CSRF (D) Style web pages 19. . OWASP Top 10 refers to: (A) HTML structure guidelines (B) Popular CSS frameworks (C) JavaScript libraries (D) A list of the most critical web application security risks 20. . The ultimate goal of web security is: (A) Structure HTML only (B) Only style web pages (C) Protect web applications, data, and users from cyber threats while ensuring privacy and integrity (D) Optimize CPU only