WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Professional Development

10 Qs

quiz-placeholder

Similar activities

IT Networking Today

IT Networking Today

Professional Development

7 Qs

Saberes previos de Elementos (dispositivos de Redes)

Saberes previos de Elementos (dispositivos de Redes)

Professional Development

8 Qs

WordPress Security Quiz

WordPress Security Quiz

Professional Development

12 Qs

ATE6123 - Fundamental of Wireless Communications -  Topic 2

ATE6123 - Fundamental of Wireless Communications - Topic 2

Professional Development

10 Qs

Quiz TIK

Quiz TIK

Professional Development

10 Qs

OSS Contribution

OSS Contribution

Professional Development

10 Qs

Ethical hacking Kali linux Part 1

Ethical hacking Kali linux Part 1

Professional Development

10 Qs

inspireIEEE

inspireIEEE

Professional Development

10 Qs

WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

G3C Team

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the right options to remediate SQL Injection vulnerability

[Multiple Choice]


Prepared Statements


Stored Procedures

Escape all user supplied input

Add HSTS in response headers

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the two insecure algorithms from the below [Multiple choice]


MD5

PBKDF2


Bcrypt


SHA-1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose HTTPS protocol version known to be secure as of date [Single choice]

SSL 3.0

SSL 2.0

TLS 1.0

TLS 1.2

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the vulnerabilities associated with Broken Access Control:

[Multiple Choice]


Vertical Privilege Escalation

Insecure Direct Object References

Local File Inclusion


SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An application implements access control check only on the front-end HTML by disabling a button for normal users [Single choice]


Front end access restriction is the best way to prevent access control issues


Malicious users can enable the button on front end allowing unauthorized access

Front end HTML cannot be modified by malicious users making it a safe implementation


Front end restriction is the only way out, and we have to accept the risk associated

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites? [Single choice]

SQL Injection

XML External Entities


Man in the middle

Cross site scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following transactions / activities are to be logged in the applications [Single choice]


Authentication successes and failures

Authorization (access control) failures


Session management failures

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?