
Top 1: Broken Access Control

Quiz
•
Other
•
Professional Development
•
Hard
CSM PSS
Used 3+ times
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the difference between authentication and authorization in the context of access control?
Authentication ensures data confidentiality, while authorization ensures data integrity
Authentication verifies user identity, while authorization determines what actions they can perform.
Authentication involves encrypting data, while authorization involves decrypting it.
Authentication and authorization are two terms for the same security concept.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which HTTP status code is commonly used to indicate that a user is attempting to access a resource for which they do not have the necessary permissions?
200 OK
401 Unauthorized
403 Forbidden
404 Not Found
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In a multi-tenant web application, how should access control be managed to prevent unauthorized access to tenant-specific data?
Use a single set of credentials for all tenants
Implement a shared access control list (ACL) for all tenants.
Employ role-based access control (RBAC) with separate roles for each tenant.
Grant full access to all tenants to simplify management
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following best describes the principle of "least privilege"?
Giving users the maximum possible access to resources
Limiting users' access to the minimum necessary to perform their tasks
Allowing users to access any resource at any time
Granting access based solely on user roles
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In a web application, users can change their email addresses by submitting a form with the new email. To protect against broken access control vulnerabilities, which of the following should be checked before updating the email?
The user's role in the application
The user's session ID
The user's current email address
The user's authentication token
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What flaw arises from session tokens having poor randomness across a range of values?
Insecure Direct Object References
Session Replay
Session Fixation
Session Hijacking
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
For every link or form which invokes state-changing functions with an unpredictable token for each user what attack can be prevented?
OS Commanding
Cross-Site Scripting
Cross Site Request Forgery
Cross Site Tracing
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Chapter 9: Automation in Protection Operations

Quiz
•
Professional Development
10 questions
15 Oct Quiz

Quiz
•
Professional Development
16 questions
Stutern Accelerator Program: 1.3 On-boarding

Quiz
•
Professional Development
15 questions
Test 8 - CCNA 2

Quiz
•
Professional Development
8 questions
CompTIA Workshop

Quiz
•
Professional Development
10 questions
HE Committee

Quiz
•
Professional Development
7 questions
The 6 C's

Quiz
•
Professional Development
10 questions
Security Testing - Session 5 - Quiz

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade