OWASP top 10

OWASP top 10

University

10 Qs

quiz-placeholder

Similar activities

ADET_F_SW1

ADET_F_SW1

University

10 Qs

SHAPING PROCESS FOR PLASTIC

SHAPING PROCESS FOR PLASTIC

KG - University

6 Qs

Samochody

Samochody

KG - Professional Development

15 Qs

Army Values and Warrior Ethos

Army Values and Warrior Ethos

University

15 Qs

FIQH MUA'SARAH IN MEDICINE

FIQH MUA'SARAH IN MEDICINE

University

9 Qs

CHAPTER 5:MOULDING PROCESSES

CHAPTER 5:MOULDING PROCESSES

University

9 Qs

2024 Manufacturing Processes Quiz

2024 Manufacturing Processes Quiz

8th Grade - University

10 Qs

Mengenal peran tim dalam ISO 22000:2018

Mengenal peran tim dalam ISO 22000:2018

University

15 Qs

OWASP top 10

OWASP top 10

Assessment

Quiz

Other

University

Easy

Created by

Le Nghia

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the category added newly in OWASP Top 10 2021?

Broken Access Control

Insecure Design

Software and Data Integrity Failure

Server-Side Request Forgery (SSRF)

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the weaknesses included in Cryptographic Failures?

Use of Hard-coded Password

Broken or Risky Crypto Algorithm

SQL Injection

Insufficient Entropy

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the weaknesses included in Software and Data Integrity Failures?

Download of Code Without Integrity Check

Insufficient Entropy

Deserialization of Untrusted Data

Broken or Risky Crypto Algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which category of OWASP Top 10 broadly cover SolarWinds malicious update-related issue?

Identification and Authentication Failures

Software and Data Integrity Failures

Server-Side Request Forgery

Security Logging and Monitoring Failures

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How to prevent Injection vulnerability in a web application?

Use Security Headers

Use of safe API

Use HTTPS/TLS protocol

Input validation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the example attacks of Identification and Authentication Failures?

CSRF

Use of Credential Stuffing

Exploiting third party component

Retrieve credit card numbers by exploiting SQL Injection flaw

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the weaknesses included in Security logging and monitoring?

Omission of Security-relevant Information

SQL Injection

Insufficient Entropy

Insertion of Sensitive Information into Log File

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?