
OWASP Top 10
Authored by z mf
Computers
University
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 3 pts
Hello..
still remember yesterday
What defines Web Application actually??
Evaluate responses using AI:
OFF
Answer explanation
Application/software/system which resides in server and using web browser to display or perform certain function and it is deliver over WWW.
2.
FILL IN THE BLANK QUESTION
1 min • 2 pts
Three main components of Web Applications Architecture are _____, _____ and _____.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
There are three layers of Web applications, namely, the presentation tier, logic tier and data tier. In which tier is responsible for handling the business workflow (e.g. verifying user credentials)?
presentation tier
logic tier
data tier
not sure tier
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is the correct order of the FIRST THREE lists in the OWASP Top 10 Vulnerability?
Broken Access Control, Cryptographic Failures and Injection.
Injection, Cryptographic Failures and Broken Access Control.
Broken Access Control, Insecure Design, and Security Misconfiguration.
Injection, Insecure Design, and Security Misconfiguration.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which web vulnerability occurs when an attacker is able to inject malicious code into a website's HTML or client-side scripts?
Injection Flaws
Cross-Site Scripting (XSS)
Broken Authentication and Session Management
Security Misconfiguration
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which web vulnerability involves an attacker manipulating the input data sent to a web application in order to execute unintended commands?
Injection Flaws
Cross-Site Scripting (XSS)
Broken Authentication and Session Management
Security Misconfiguration
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which web vulnerability occurs when an attacker is able to gain unauthorized access to sensitive data by bypassing the access controls in a web application?
Injection Flaws
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Chapter 1: Introduction to Computer
Quiz
•
University
12 questions
Kuiz Komputer dan ICT
Quiz
•
1st Grade - University
10 questions
Layered Network Models
Quiz
•
University
10 questions
Tes Awal Modul 5 CC
Quiz
•
University
15 questions
untitled
Quiz
•
11th Grade - University
20 questions
ป.4 แบบทดสอบปลายภาคเรียนที่ 2/2567 ชุดที่ 1
Quiz
•
4th Grade - University
13 questions
Question of MCE
Quiz
•
University
10 questions
Android
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University