
OWASP Top 10 Quiz - Easy
Authored by NUTTHAPHON SUWANWONG
English
Professional Development
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these are examples of "Injection" attacks?
A bad guy edits high scores on a leaderboard.
A website changes colors when you click something.
A program sends malicious instructions to the server.
Your password stops working.
Answer explanation
A program sends malicious instructions to the server. Similar to the form example, sending crafted inputs or instructions can manipulate a server's behavior.
A program sends malicious instructions to the server. Similar to the form example, sending crafted inputs or instructions can manipulate a server's behavior.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can go wrong with "Broken Access Control"?
Someone guesses your password.
You can't log into your favorite game.
A user can see things they shouldn't.
A hacker puts bad code into a website form.
Answer explanation
A user can see things they shouldn't. Broken access control means not defining who can see or do certain things. This could allow unauthorized viewing of private data.
A user can see things they shouldn't. Broken access control means not defining who can see or do certain things. This could allow unauthorized viewing of private data.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Security Misconfiguration" means:
A website doesn't protect your data well.
A website is poorly built from the start.
Your computer has a virus.
You forgot to turn off your game console.
Answer explanation
A website doesn't protect your data well. This is a key element of security misconfiguration. It could lead to data being exposed or modified.
A website doesn't protect your data well. This is a key element of security misconfiguration. It could lead to data being exposed or modified.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these are problems with "Insecure Design"?
A website has old, un-updated software.
Security isn't thought about enough.
Users don't pick strong passwords
Websites have lots of bugs.
Answer explanation
Security isn't thought about enough. Security needs to be considered as part of the design process, not as an afterthought.
Security isn't thought about enough. Security needs to be considered as part of the design process, not as an afterthought.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What could be a result of "Sensitive Data Exposure"?
An attacker stealing information from a website.
Your friend seeing your birthday.
Your bank account information being leaked.
A website forgetting what level you were in a game.
Answer explanation
Your bank account information being leaked. Financial data is a primary target for attackers and should be heavily protected.
Your bank account information being leaked. Financial data is a primary target for attackers and should be heavily protected.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which actions could be harmful due to "XML External Entities (XXE)"?
Opening a document from an unknown source.
Your game crashing unexpectedly.
Someone finding your private photos online.
Using a USB drive you found.
Answer explanation
Opening a document from an unknown source. XXE attacks can exploit how XML documents are processed, so opening untrusted files is dangerous.
Opening a document from an unknown source. XXE attacks can exploit how XML documents are processed, so opening untrusted files is dangerous.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can happen when using "Components with Known Vulnerabilities"?
Your computer runs slower.
Websites don't load right.
You get more pop-up ads.
Hackers can exploit weaknesses in the software.
Answer explanation
Hackers can exploit weaknesses in the software. The heart of this OWASP category is using components (libraries, frameworks) that have known vulnerabilities, leaving you open to attack.
Hackers can exploit weaknesses in the software. The heart of this OWASP category is using components (libraries, frameworks) that have known vulnerabilities, leaving you open to attack.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
If-clauses 1-3
Quiz
•
Professional Development
10 questions
Principles of Language Learning
Quiz
•
Professional Development
12 questions
Interchange Intro B - Units 13 and 14
Quiz
•
Professional Development
13 questions
Love is in the Air (Flower Thrower)
Quiz
•
Professional Development
11 questions
Past simple & continuous
Quiz
•
Professional Development
10 questions
Modals
Quiz
•
Professional Development
10 questions
Teacher Roles
Quiz
•
University - Professi...
13 questions
Paper 1 English AQA
Quiz
•
8th Grade - Professio...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for English
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development