OWASP Top 10 Quiz - Easy

OWASP Top 10 Quiz - Easy

Professional Development

10 Qs

quiz-placeholder

Similar activities

Fake news

Fake news

5th Grade - Professional Development

10 Qs

Scratch Simple Quiz

Scratch Simple Quiz

KG - Professional Development

10 Qs

Quiz game about board games!

Quiz game about board games!

1st Grade - Professional Development

10 Qs

IT A2-B1, Module 1 test

IT A2-B1, Module 1 test

Professional Development

10 Qs

Technology

Technology

Professional Development

10 Qs

Academic Sources Quiz

Academic Sources Quiz

Professional Development

15 Qs

Internet verbs

Internet verbs

Professional Development

15 Qs

Website - Questions and Answers - Quiz

Website - Questions and Answers - Quiz

Professional Development

7 Qs

OWASP Top 10 Quiz - Easy

OWASP Top 10 Quiz - Easy

Assessment

Quiz

English

Professional Development

Medium

Created by

NUTTHAPHON SUWANWONG

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of these are examples of "Injection" attacks?

A bad guy edits high scores on a leaderboard.

  • A website changes colors when you click something.

  • A program sends malicious instructions to the server.

  • Your password stops working.

Answer explanation

  • A program sends malicious instructions to the server. Similar to the form example, sending crafted inputs or instructions can manipulate a server's behavior.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What can go wrong with "Broken Access Control"?

  • Someone guesses your password.

  • You can't log into your favorite game.

  • A user can see things they shouldn't.

  • A hacker puts bad code into a website form.

Answer explanation

  • A user can see things they shouldn't. Broken access control means not defining who can see or do certain things. This could allow unauthorized viewing of private data.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

"Security Misconfiguration" means:

  • A website doesn't protect your data well.

  • A website is poorly built from the start.

  • Your computer has a virus.

  • You forgot to turn off your game console.

Answer explanation

  • A website doesn't protect your data well. This is a key element of security misconfiguration. It could lead to data being exposed or modified.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of these are problems with "Insecure Design"?

  • A website has old, un-updated software.

  • Security isn't thought about enough.

  • Users don't pick strong passwords

  • Websites have lots of bugs.

Answer explanation

  • Security isn't thought about enough. Security needs to be considered as part of the design process, not as an afterthought.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What could be a result of "Sensitive Data Exposure"?

  • An attacker stealing information from a website.

  • Your friend seeing your birthday.

  • Your bank account information being leaked.

A website forgetting what level you were in a game.

Answer explanation

  • Your bank account information being leaked. Financial data is a primary target for attackers and should be heavily protected.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which actions could be harmful due to "XML External Entities (XXE)"?

  • Opening a document from an unknown source.

  • Your game crashing unexpectedly.

  • Someone finding your private photos online.

  • Using a USB drive you found.

Answer explanation

  • Opening a document from an unknown source. XXE attacks can exploit how XML documents are processed, so opening untrusted files is dangerous.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What can happen when using "Components with Known Vulnerabilities"?

  • Your computer runs slower.

  • Websites don't load right.

  • You get more pop-up ads.

  • Hackers can exploit weaknesses in the software.

Answer explanation

  • Hackers can exploit weaknesses in the software. The heart of this OWASP category is using components (libraries, frameworks) that have known vulnerabilities, leaving you open to attack.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?