OWASP

OWASP

University

10 Qs

quiz-placeholder

Similar activities

Career Path in IT

Career Path in IT

University

10 Qs

iCIO Contribute - Binus University

iCIO Contribute - Binus University

University

10 Qs

Operating System - Chapter 1-1

Operating System - Chapter 1-1

University

10 Qs

ASK T3 2.1 Kriptografi dalam Keselamatan Data

ASK T3 2.1 Kriptografi dalam Keselamatan Data

University

15 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Database Management

Database Management

12th Grade - University

11 Qs

IoT Trivia_2

IoT Trivia_2

University

8 Qs

Computer Hardware foundation degree 1

Computer Hardware foundation degree 1

University

12 Qs

OWASP

OWASP

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Patrick Briones

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

From OWASP's Top 10 Year 2021, which security risk is ranked 1st?

Injection

Server-side Request Forgery (SSRF)

Broken Access Control

Security Misconfiguration

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does OWASP stand for? Fill in the blank

Open Web _________ Security Project

Application

Attribute

Assessment

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following solutions or mitigating controls does not apply to A02:2021-Cryptographic Failures?

Make sure to encrypt all sensitive data in both in transit and at rest

Remove unnecessary components

Implement proper key management

Use strong encryption algorithms

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following security risk identified by OWASP Top 10 relates to tampering of source code or components?

Identification and Authentication Failures

Broken Access Control

Software and Data Integrity Failures

Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following security risk identified by OWASP Top 10 relates to having the web application fetching a remote resource without validating the user-supplied URL?

Security Misconfiguration

Identification and Authentication Failures

Server - Side Request Forgery (SSRF)

Insecure Design

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When was OWASP Top 10 list updated?

2020

2021

2023

2017

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a common solution or mitigating control against Vulnerable and Outdated Components, and Security Misconfiguration?

Data sanitation

Remove unnecessary components

Implement multi-factor authentication

Parameterized queries

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?