
OWASP Top 10
Authored by z mf
Computers
University
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 3 pts
Hello..
still remember yesterday
What defines Web Application actually??
Evaluate responses using AI:
OFF
Answer explanation
Application/software/system which resides in server and using web browser to display or perform certain function and it is deliver over WWW.
2.
FILL IN THE BLANK QUESTION
1 min • 2 pts
Three main components of Web Applications Architecture are _____, _____ and _____.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
There are three layers of Web applications, namely, the presentation tier, logic tier and data tier. In which tier is responsible for handling the business workflow (e.g. verifying user credentials)?
presentation tier
logic tier
data tier
not sure tier
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is the correct order of the FIRST THREE lists in the OWASP Top 10 Vulnerability?
Broken Access Control, Cryptographic Failures and Injection.
Injection, Cryptographic Failures and Broken Access Control.
Broken Access Control, Insecure Design, and Security Misconfiguration.
Injection, Insecure Design, and Security Misconfiguration.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which web vulnerability occurs when an attacker is able to inject malicious code into a website's HTML or client-side scripts?
Injection Flaws
Cross-Site Scripting (XSS)
Broken Authentication and Session Management
Security Misconfiguration
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which web vulnerability involves an attacker manipulating the input data sent to a web application in order to execute unintended commands?
Injection Flaws
Cross-Site Scripting (XSS)
Broken Authentication and Session Management
Security Misconfiguration
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which web vulnerability occurs when an attacker is able to gain unauthorized access to sensitive data by bypassing the access controls in a web application?
Injection Flaws
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?