WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cloud Practitioner Essentials Quiz

Cloud Practitioner Essentials Quiz

Professional Development

10 Qs

Speed Quiz TCBian Visit

Speed Quiz TCBian Visit

Professional Development

10 Qs

Web Development Mastery

Web Development Mastery

Professional Development

10 Qs

Audience Targeting in SharePoint

Audience Targeting in SharePoint

Professional Development

9 Qs

Understanding BOM in JavaScript (11R)

Understanding BOM in JavaScript (11R)

Professional Development

15 Qs

Microsoft IT Pro Meetup - July

Microsoft IT Pro Meetup - July

Professional Development

15 Qs

CSS National Training TechPro Class 1

CSS National Training TechPro Class 1

Professional Development

15 Qs

WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

G3C Team

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the right options to remediate SQL Injection vulnerability

[Multiple Choice]


Prepared Statements


Stored Procedures

Escape all user supplied input

Add HSTS in response headers

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the two insecure algorithms from the below [Multiple choice]


MD5

PBKDF2


Bcrypt


SHA-1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose HTTPS protocol version known to be secure as of date [Single choice]

SSL 3.0

SSL 2.0

TLS 1.0

TLS 1.2

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the vulnerabilities associated with Broken Access Control:

[Multiple Choice]


Vertical Privilege Escalation

Insecure Direct Object References

Local File Inclusion


SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An application implements access control check only on the front-end HTML by disabling a button for normal users [Single choice]


Front end access restriction is the best way to prevent access control issues


Malicious users can enable the button on front end allowing unauthorized access

Front end HTML cannot be modified by malicious users making it a safe implementation


Front end restriction is the only way out, and we have to accept the risk associated

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites? [Single choice]

SQL Injection

XML External Entities


Man in the middle

Cross site scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following transactions / activities are to be logged in the applications [Single choice]


Authentication successes and failures

Authorization (access control) failures


Session management failures

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?