Top 1: Broken Access Control

Top 1: Broken Access Control

Professional Development

11 Qs

quiz-placeholder

Similar activities

Salesforce Quiz

Salesforce Quiz

Professional Development

15 Qs

Security+

Security+

Professional Development

15 Qs

Security Awareness - Learning Check

Security Awareness - Learning Check

Professional Development

10 Qs

Cybersecurity Fundamentals for Government and Corporate Leaders

Cybersecurity Fundamentals for Government and Corporate Leaders

Professional Development

16 Qs

Activity 1

Activity 1

Professional Development

10 Qs

Test 8 - CCNA 2

Test 8 - CCNA 2

Professional Development

15 Qs

IT Training

IT Training

Professional Development

10 Qs

Postman API 102

Postman API 102

Professional Development

15 Qs

Top 1: Broken Access Control

Top 1: Broken Access Control

Assessment

Quiz

Other

Professional Development

Hard

Created by

CSM PSS

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the difference between authentication and authorization in the context of access control?

Authentication ensures data confidentiality, while authorization ensures data integrity

Authentication verifies user identity, while authorization determines what actions they can perform.

Authentication involves encrypting data, while authorization involves decrypting it.

Authentication and authorization are two terms for the same security concept.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which HTTP status code is commonly used to indicate that a user is attempting to access a resource for which they do not have the necessary permissions?

200 OK

401 Unauthorized

403 Forbidden

404 Not Found

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a multi-tenant web application, how should access control be managed to prevent unauthorized access to tenant-specific data?

Use a single set of credentials for all tenants

Implement a shared access control list (ACL) for all tenants.

Employ role-based access control (RBAC) with separate roles for each tenant.

Grant full access to all tenants to simplify management

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best describes the principle of "least privilege"?

Giving users the maximum possible access to resources

Limiting users' access to the minimum necessary to perform their tasks

Allowing users to access any resource at any time

Granting access based solely on user roles

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a web application, users can change their email addresses by submitting a form with the new email. To protect against broken access control vulnerabilities, which of the following should be checked before updating the email?

The user's role in the application

The user's session ID

The user's current email address

The user's authentication token

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What flaw arises from session tokens having poor randomness across a range of values?

Insecure Direct Object References

Session Replay

Session Fixation

Session Hijacking

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

For every link or form which invokes state-changing functions with an unpredictable token for each user what attack can be prevented?

OS Commanding

Cross-Site Scripting

Cross Site Request Forgery

Cross Site Tracing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?