Search Header Logo

OWASP Top 10

Authored by keren tsion

Used 3+ times

OWASP Top 10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the top-level categories of the OWASP Top 10 vulnerability list?

A1 -Broken Authentication

A2 -Injection

A6 -Broken Access Control

A10 -Insufficient Logging & Monitoring

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a vulnerability from the OWASP Top 10?

A5 - BruteForce

A7 - XSS (Cross-Site Scripting)

A9 - Message Sending

A3 - Command Injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of issue is Broken Access Control?

Client-Side

Server-Side

Application-Level

Network-Level

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT part of the OWASP Top 10?

A3 Hacking

A6 Insufficient Logging & Monitoring

A7 Cross Site Request Forgery

A8 Airgap Compromise

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerabilities are addressed by OWASP Top 10?

Exploits

Reverse Engineering

Brute Force

All of the Above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the 6th vulnerability listed in the OWASP Top 10?

A7 Cross Site Scripting (XSS)

A8 Insecure Deserialization

A9 Using Components with Known Vulnerabilities

A5 Security Misconfiguration

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attack can be classified as application-level?

Bruteforce

DDoS

XSS

Session Hijacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?