WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Professional Development

10 Qs

quiz-placeholder

Similar activities

Fundamental Series Post Test : Introduction to Basic HTML

Fundamental Series Post Test : Introduction to Basic HTML

Professional Development

10 Qs

Audience Targeting in SharePoint

Audience Targeting in SharePoint

Professional Development

9 Qs

BTMC Mockup Assessment

BTMC Mockup Assessment

Professional Development

5 Qs

ESDE GOTH Stack Quiz

ESDE GOTH Stack Quiz

Professional Development

10 Qs

Ethical hacking Kali linux Part 1

Ethical hacking Kali linux Part 1

Professional Development

10 Qs

14.08.2024

14.08.2024

Professional Development

10 Qs

LINKS Cyber Youth Challenge - Round 4

LINKS Cyber Youth Challenge - Round 4

Professional Development

10 Qs

Knowledge Check 2

Knowledge Check 2

Professional Development

10 Qs

WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

G3C Team

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the right options to remediate SQL Injection vulnerability

[Multiple Choice]


Prepared Statements


Stored Procedures

Escape all user supplied input

Add HSTS in response headers

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the two insecure algorithms from the below [Multiple choice]


MD5

PBKDF2


Bcrypt


SHA-1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose HTTPS protocol version known to be secure as of date [Single choice]

SSL 3.0

SSL 2.0

TLS 1.0

TLS 1.2

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the vulnerabilities associated with Broken Access Control:

[Multiple Choice]


Vertical Privilege Escalation

Insecure Direct Object References

Local File Inclusion


SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An application implements access control check only on the front-end HTML by disabling a button for normal users [Single choice]


Front end access restriction is the best way to prevent access control issues


Malicious users can enable the button on front end allowing unauthorized access

Front end HTML cannot be modified by malicious users making it a safe implementation


Front end restriction is the only way out, and we have to accept the risk associated

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites? [Single choice]

SQL Injection

XML External Entities


Man in the middle

Cross site scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following transactions / activities are to be logged in the applications [Single choice]


Authentication successes and failures

Authorization (access control) failures


Session management failures

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?