
Top 1: Broken Access Control

Quiz
•
Other
•
Professional Development
•
Hard
CSM PSS
Used 3+ times
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the difference between authentication and authorization in the context of access control?
Authentication ensures data confidentiality, while authorization ensures data integrity
Authentication verifies user identity, while authorization determines what actions they can perform.
Authentication involves encrypting data, while authorization involves decrypting it.
Authentication and authorization are two terms for the same security concept.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which HTTP status code is commonly used to indicate that a user is attempting to access a resource for which they do not have the necessary permissions?
200 OK
401 Unauthorized
403 Forbidden
404 Not Found
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In a multi-tenant web application, how should access control be managed to prevent unauthorized access to tenant-specific data?
Use a single set of credentials for all tenants
Implement a shared access control list (ACL) for all tenants.
Employ role-based access control (RBAC) with separate roles for each tenant.
Grant full access to all tenants to simplify management
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following best describes the principle of "least privilege"?
Giving users the maximum possible access to resources
Limiting users' access to the minimum necessary to perform their tasks
Allowing users to access any resource at any time
Granting access based solely on user roles
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In a web application, users can change their email addresses by submitting a form with the new email. To protect against broken access control vulnerabilities, which of the following should be checked before updating the email?
The user's role in the application
The user's session ID
The user's current email address
The user's authentication token
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What flaw arises from session tokens having poor randomness across a range of values?
Insecure Direct Object References
Session Replay
Session Fixation
Session Hijacking
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
For every link or form which invokes state-changing functions with an unpredictable token for each user what attack can be prevented?
OS Commanding
Cross-Site Scripting
Cross Site Request Forgery
Cross Site Tracing
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Tiktok Test Knowledge

Quiz
•
University - Professi...
6 questions
Cyber Security Vocabulary Review

Quiz
•
Professional Development
10 questions
Cybersecurity Fundamentals - Chapter 2

Quiz
•
Professional Development
15 questions
REFRESHMENT #1 CST EA

Quiz
•
Professional Development
10 questions
Library Services and Digitalization Quiz 2

Quiz
•
Professional Development
10 questions
Cyber Thursday - Broken Authentication

Quiz
•
Professional Development
15 questions
Salesforce Quiz

Quiz
•
Professional Development
15 questions
Insider Threats Quiz

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade