Broken Access control II

Broken Access control II

Professional Development

10 Qs

quiz-placeholder

Similar activities

Universal Youth Movement ( ICE BREAKING )

Universal Youth Movement ( ICE BREAKING )

1st Grade - Professional Development

15 Qs

eBPLS Updates Quiz 1

eBPLS Updates Quiz 1

Professional Development

10 Qs

Santa Claus 2.0

Santa Claus 2.0

KG - Professional Development

10 Qs

Security Awareness - Learning Check

Security Awareness - Learning Check

Professional Development

10 Qs

Delivery Assistant

Delivery Assistant

Professional Development

10 Qs

Google Apps For Ed. Quiz

Google Apps For Ed. Quiz

Professional Development

10 Qs

Activity 1

Activity 1

Professional Development

10 Qs

all tasks among us

all tasks among us

KG - Professional Development

10 Qs

Broken Access control II

Broken Access control II

Assessment

Quiz

Other

Professional Development

Hard

Created by

G3C Team

Used 28+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Vulnerabilities associated with Broken Access Control:

[Multiple Choice]

Forced Browsing

IDOR

LFI

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

$file = $_GET['file'];

include('directory/' . $file);


This PHP code can lead to:

XXE

Local File Inclusion

Insecure Direct Object Reference

Cross-site scripting

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

The secure file permission(s) are:

-rws---r-x root root

-rwx------ root root

drwxr-x-w- root root

-r-xr-xr-x root root

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Forced Browsing is:

Forcing the application to upload malicious file

Remote code execution in the webserver

enumerate and access resources that are not referenced by the application, but are still accessible

None of these

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat are you vulnerable to if you do not validate authorization of user for direct references to restricted resources?

Cross site scripting

Cross Site Request Forgery

SQL Injection

Insecure Direct Object References

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are effective ways to implement access control?

[Multiple Choice]

Implementing Access Control Matrix for application resources

Using hidden form fields to authorize

Logging unauthorized users actions

Enforcing RWX permission for every files on server for everyone

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Taking control of Admin functionality and Misusing sensitive data that they are unauthorized to access is:

Xml Enternal Entities Injection

SQL Injection

Cross site scripting

Broken Access Control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?