Search Header Logo

Top 1: Broken Access Control

Authored by CSM PSS

Other

Professional Development

Used 3+ times

Top 1: Broken Access Control
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the difference between authentication and authorization in the context of access control?

Authentication ensures data confidentiality, while authorization ensures data integrity

Authentication verifies user identity, while authorization determines what actions they can perform.

Authentication involves encrypting data, while authorization involves decrypting it.

Authentication and authorization are two terms for the same security concept.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which HTTP status code is commonly used to indicate that a user is attempting to access a resource for which they do not have the necessary permissions?

200 OK

401 Unauthorized

403 Forbidden

404 Not Found

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a multi-tenant web application, how should access control be managed to prevent unauthorized access to tenant-specific data?

Use a single set of credentials for all tenants

Implement a shared access control list (ACL) for all tenants.

Employ role-based access control (RBAC) with separate roles for each tenant.

Grant full access to all tenants to simplify management

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best describes the principle of "least privilege"?

Giving users the maximum possible access to resources

Limiting users' access to the minimum necessary to perform their tasks

Allowing users to access any resource at any time

Granting access based solely on user roles

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a web application, users can change their email addresses by submitting a form with the new email. To protect against broken access control vulnerabilities, which of the following should be checked before updating the email?

The user's role in the application

The user's session ID

The user's current email address

The user's authentication token

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What flaw arises from session tokens having poor randomness across a range of values?

Insecure Direct Object References

Session Replay

Session Fixation

Session Hijacking

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

For every link or form which invokes state-changing functions with an unpredictable token for each user what attack can be prevented?

OS Commanding

Cross-Site Scripting

Cross Site Request Forgery

Cross Site Tracing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?