Top 1: Broken Access Control

Top 1: Broken Access Control

Professional Development

11 Qs

quiz-placeholder

Similar activities

lesson 5

lesson 5

Professional Development

10 Qs

ISO Week - Day 2 (20000-1 & 27001)

ISO Week - Day 2 (20000-1 & 27001)

Professional Development

10 Qs

M05_RAFITs and layers of technology

M05_RAFITs and layers of technology

Professional Development

10 Qs

Library Services and Digitalization Quiz 2

Library Services and Digitalization Quiz 2

Professional Development

10 Qs

Analytics Quiz 2

Analytics Quiz 2

Professional Development

10 Qs

Nexthink

Nexthink

Professional Development

10 Qs

Brown Bag : MINI GAME 1 (POP QUIZZ)

Brown Bag : MINI GAME 1 (POP QUIZZ)

Professional Development

10 Qs

Cybersecurity Fundamentals - Chapter 2

Cybersecurity Fundamentals - Chapter 2

Professional Development

10 Qs

Top 1: Broken Access Control

Top 1: Broken Access Control

Assessment

Quiz

Other

Professional Development

Hard

Created by

CSM PSS

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the difference between authentication and authorization in the context of access control?

Authentication ensures data confidentiality, while authorization ensures data integrity

Authentication verifies user identity, while authorization determines what actions they can perform.

Authentication involves encrypting data, while authorization involves decrypting it.

Authentication and authorization are two terms for the same security concept.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which HTTP status code is commonly used to indicate that a user is attempting to access a resource for which they do not have the necessary permissions?

200 OK

401 Unauthorized

403 Forbidden

404 Not Found

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a multi-tenant web application, how should access control be managed to prevent unauthorized access to tenant-specific data?

Use a single set of credentials for all tenants

Implement a shared access control list (ACL) for all tenants.

Employ role-based access control (RBAC) with separate roles for each tenant.

Grant full access to all tenants to simplify management

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best describes the principle of "least privilege"?

Giving users the maximum possible access to resources

Limiting users' access to the minimum necessary to perform their tasks

Allowing users to access any resource at any time

Granting access based solely on user roles

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In a web application, users can change their email addresses by submitting a form with the new email. To protect against broken access control vulnerabilities, which of the following should be checked before updating the email?

The user's role in the application

The user's session ID

The user's current email address

The user's authentication token

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What flaw arises from session tokens having poor randomness across a range of values?

Insecure Direct Object References

Session Replay

Session Fixation

Session Hijacking

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

For every link or form which invokes state-changing functions with an unpredictable token for each user what attack can be prevented?

OS Commanding

Cross-Site Scripting

Cross Site Request Forgery

Cross Site Tracing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?