1. Before integrating a Web application, a designer must be aware of the associated risks and measures to mitigate those risks. 2. Which of the following are primary components of a Web application? (Select three.) 3. When a secure Web application is designed, the only aspect that can be manipulated is private access areas. 4. A security policy may contain which of the following elements? 5. You are part of programming team developing a Web application. Your manager has implemented tracking mechanisms to ensure all developers work on the application within the same guidelines. What has your manager implemented? 7. Session management defines how systems handle and manage user sessions. A. True B. False 8. can occur within a Web application when a user's authentication token is intercepted by the attackers and used to bypass the authentication controls of the application. 9. Which of the following are fundamental aspects of the JavaScript secure coding standard? (Select two.) A. Duplicate code for redundancy B. Restrict privileges C. Establish trust boundaries D. Use Dynamic SQL10. You have decided to use several forms in your HTML Web site. Which of the following types of attacks may take advantage of poorly programmed HTML forms? A. Social engineering B. Injection C. Man-in-the-middle D. Elevation of privilege 11. Which of the following should you use to secure online forms? A. Input validation B. Secure communication protocols C. Password protection D. All of the above 12. Error messages can reveal information about a server that an attacker can use to exploit the system. A. True B. False.