Cyber Thursday - Broken Authentication

Cyber Thursday - Broken Authentication

Professional Development

10 Qs

quiz-placeholder

Similar activities

Arthritides & Connective Tissue Disease

Arthritides & Connective Tissue Disease

University - Professional Development

10 Qs

Culture Workshop

Culture Workshop

KG - Professional Development

10 Qs

Cyber-attacks, Domain Disputes

Cyber-attacks, Domain Disputes

Professional Development

11 Qs

URBAN PEST QUIZ

URBAN PEST QUIZ

University - Professional Development

10 Qs

e-PECAS

e-PECAS

Professional Development

10 Qs

Riris Akun Belajar

Riris Akun Belajar

Professional Development

10 Qs

PTSD in the classroom

PTSD in the classroom

Professional Development

10 Qs

SOC Live Quiz

SOC Live Quiz

KG - Professional Development

10 Qs

Cyber Thursday - Broken Authentication

Cyber Thursday - Broken Authentication

Assessment

Quiz

Other

Professional Development

Practice Problem

Hard

Created by

Chitranjali Banjare

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Broken Authentication is caused due to

Exposure of sensitive application/user details to unauthorized users

older or poorly configured XML processors evaluate external entity references within XML documents

improper implementation of authentication and session management

application includes untrusted data in a new web page without proper validation or escaping

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

"iloveindia" is strong password

true

flase

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Implementation of password strength check at client side only is enough to prevent broken authentication

false

true

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which threat can be prevented by having unique usernames generated with a high degree of entropy?

Crypt-analysis of hash values

Spamming

Authorization Bypass

Authentication bypass

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What flaw arises from session tokens having poor randomness across a range of values?

Insecure Direct Object References

Session Replay

Session Hijacking

Session Fixation

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

An attack technique that forces a user's session credential or session ID to an explicit value.

Session Fixation

Brute Force Attack

XSS

Dictionary Attack

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Role-Based Access control helps prevent this OWASP Top 10 weakness

Forced Browsing or failure to restrict URL

Invalidated redirect and forward

Insecure Misconfiguration

SQL Injection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?