OWASP Top 10 Web Application Security Risks (2021)

OWASP Top 10 Web Application Security Risks (2021)

12th Grade

15 Qs

quiz-placeholder

Similar activities

Level F Unit 7: Synonyms and Antonyms

Level F Unit 7: Synonyms and Antonyms

12th Grade

20 Qs

Level F- Unit 7: Completing the Sentence

Level F- Unit 7: Completing the Sentence

12th Grade

20 Qs

English IV: Vocab 1-5 Boss Challenge

English IV: Vocab 1-5 Boss Challenge

9th - 12th Grade

10 Qs

Unit 4 Vocab

Unit 4 Vocab

9th - 12th Grade

11 Qs

6.33 OPD dictionary Health/Body/ Hygiene

6.33 OPD dictionary Health/Body/ Hygiene

4th - 12th Grade

17 Qs

Developing An Acceptable Use Agreement

Developing An Acceptable Use Agreement

12th Grade

10 Qs

Data Analytics Quiz lesson 2-2

Data Analytics Quiz lesson 2-2

12th Grade

10 Qs

Encryption Quiz - Open Note

Encryption Quiz - Open Note

12th Grade

10 Qs

OWASP Top 10 Web Application Security Risks (2021)

OWASP Top 10 Web Application Security Risks (2021)

Assessment

Quiz

English

12th Grade

Easy

Created by

Baba Shaheer

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'Broken Access Control' in web application security?

A vulnerability that allows unauthorized users to access restricted areas

A method to enhance user interface design

A technique for improving database performance

A strategy for optimizing network bandwidth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are 'Cryptographic Failures' and how can they be mitigated?

They are failures in cryptographic algorithms and can be mitigated by using strong encryption standards.

They are network failures and can be mitigated by improving bandwidth.

They are hardware failures and can be mitigated by upgrading devices.

They are software bugs and can be mitigated by regular updates.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes 'Injection' as a web application security risk?

A technique used to improve website performance

A method to inject malicious code into a web application

A strategy for enhancing user interface design

A process for optimizing database queries

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Dashboard tab in Burp Suite?

To manage user accounts

To display an overview of the current security testing status

To configure network settings

To write custom scripts

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a mitigation strategy for IDOR?

Implement proper access controls

Use direct references

Ignore authorization checks

Allow unauthorized access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key mitigation strategy for BFLA/BOLA?

Implementing strong authentication mechanisms

Increasing network bandwidth

Using outdated software

Ignoring security updates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common issue associated with cryptographic failures as mentioned in the OWASP Top 10 - 2021?

Insecure storage of cryptographic keys

Use of strong and updated cryptographic algorithms

Regular security audits

Implementing multi-factor authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?