WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Professional Development

10 Qs

quiz-placeholder

Similar activities

OT Cyber Security Audit Workshop

OT Cyber Security Audit Workshop

Professional Development

8 Qs

ESDE GOTH Stack Quiz

ESDE GOTH Stack Quiz

Professional Development

10 Qs

Introduction of Microsoft 365 Apps for Business

Introduction of Microsoft 365 Apps for Business

Professional Development

10 Qs

EarleandWilson_TC_223052025

EarleandWilson_TC_223052025

Professional Development

11 Qs

Developer 05 - Quizziz

Developer 05 - Quizziz

Professional Development

15 Qs

OXORD Quiz on Online Orientation

OXORD Quiz on Online Orientation

Professional Development

11 Qs

Google cloud Monitoring

Google cloud Monitoring

Professional Development

8 Qs

Knowledge Check 2

Knowledge Check 2

Professional Development

10 Qs

WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

G3C Team

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the right options to remediate SQL Injection vulnerability

[Multiple Choice]


Prepared Statements


Stored Procedures

Escape all user supplied input

Add HSTS in response headers

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the two insecure algorithms from the below [Multiple choice]


MD5

PBKDF2


Bcrypt


SHA-1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose HTTPS protocol version known to be secure as of date [Single choice]

SSL 3.0

SSL 2.0

TLS 1.0

TLS 1.2

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the vulnerabilities associated with Broken Access Control:

[Multiple Choice]


Vertical Privilege Escalation

Insecure Direct Object References

Local File Inclusion


SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An application implements access control check only on the front-end HTML by disabling a button for normal users [Single choice]


Front end access restriction is the best way to prevent access control issues


Malicious users can enable the button on front end allowing unauthorized access

Front end HTML cannot be modified by malicious users making it a safe implementation


Front end restriction is the only way out, and we have to accept the risk associated

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites? [Single choice]

SQL Injection

XML External Entities


Man in the middle

Cross site scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following transactions / activities are to be logged in the applications [Single choice]


Authentication successes and failures

Authorization (access control) failures


Session management failures

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?