OWASP Top 10 Quiz - Easy
Quiz
•
English
•
Professional Development
•
Practice Problem
•
Medium
NUTTHAPHON SUWANWONG
Used 12+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these are examples of "Injection" attacks?
A bad guy edits high scores on a leaderboard.
A website changes colors when you click something.
A program sends malicious instructions to the server.
Your password stops working.
Answer explanation
A program sends malicious instructions to the server. Similar to the form example, sending crafted inputs or instructions can manipulate a server's behavior.
A program sends malicious instructions to the server. Similar to the form example, sending crafted inputs or instructions can manipulate a server's behavior.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can go wrong with "Broken Access Control"?
Someone guesses your password.
You can't log into your favorite game.
A user can see things they shouldn't.
A hacker puts bad code into a website form.
Answer explanation
A user can see things they shouldn't. Broken access control means not defining who can see or do certain things. This could allow unauthorized viewing of private data.
A user can see things they shouldn't. Broken access control means not defining who can see or do certain things. This could allow unauthorized viewing of private data.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Security Misconfiguration" means:
A website doesn't protect your data well.
A website is poorly built from the start.
Your computer has a virus.
You forgot to turn off your game console.
Answer explanation
A website doesn't protect your data well. This is a key element of security misconfiguration. It could lead to data being exposed or modified.
A website doesn't protect your data well. This is a key element of security misconfiguration. It could lead to data being exposed or modified.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these are problems with "Insecure Design"?
A website has old, un-updated software.
Security isn't thought about enough.
Users don't pick strong passwords
Websites have lots of bugs.
Answer explanation
Security isn't thought about enough. Security needs to be considered as part of the design process, not as an afterthought.
Security isn't thought about enough. Security needs to be considered as part of the design process, not as an afterthought.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What could be a result of "Sensitive Data Exposure"?
An attacker stealing information from a website.
Your friend seeing your birthday.
Your bank account information being leaked.
A website forgetting what level you were in a game.
Answer explanation
Your bank account information being leaked. Financial data is a primary target for attackers and should be heavily protected.
Your bank account information being leaked. Financial data is a primary target for attackers and should be heavily protected.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which actions could be harmful due to "XML External Entities (XXE)"?
Opening a document from an unknown source.
Your game crashing unexpectedly.
Someone finding your private photos online.
Using a USB drive you found.
Answer explanation
Opening a document from an unknown source. XXE attacks can exploit how XML documents are processed, so opening untrusted files is dangerous.
Opening a document from an unknown source. XXE attacks can exploit how XML documents are processed, so opening untrusted files is dangerous.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can happen when using "Components with Known Vulnerabilities"?
Your computer runs slower.
Websites don't load right.
You get more pop-up ads.
Hackers can exploit weaknesses in the software.
Answer explanation
Hackers can exploit weaknesses in the software. The heart of this OWASP category is using components (libraries, frameworks) that have known vulnerabilities, leaving you open to attack.
Hackers can exploit weaknesses in the software. The heart of this OWASP category is using components (libraries, frameworks) that have known vulnerabilities, leaving you open to attack.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
12 questions
Adjective + preposition (B1)
Quiz
•
Professional Development
10 questions
Telephone English
Quiz
•
Professional Development
10 questions
Past Tense
Quiz
•
Professional Development
12 questions
Elementary Comparatives
Quiz
•
5th Grade - Professio...
10 questions
Expressing Opinion in Essays
Quiz
•
Professional Development
10 questions
Family Huddle Fun Quiz
Quiz
•
Professional Development
15 questions
Rigel A
Quiz
•
10th Grade - Professi...
10 questions
Vocabulary - Speakout Intermediate Unit 1
Quiz
•
7th Grade - Professio...
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
