WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Professional Development

10 Qs

quiz-placeholder

Similar activities

HTML Fundamentals Assessment

HTML Fundamentals Assessment

Professional Development

10 Qs

Backlog Refinement Quiz

Backlog Refinement Quiz

Professional Development

10 Qs

Content Creator Job Assessment

Content Creator Job Assessment

Professional Development

10 Qs

Python Chapter 5: Functions

Python Chapter 5: Functions

Professional Development

15 Qs

Having fun with quizzes

Having fun with quizzes

Professional Development

12 Qs

PYTHON QUIZ

PYTHON QUIZ

Professional Development

10 Qs

QUIZ IT HSSE MONTHLY MEETING - EDISI KEMERDEKAAN

QUIZ IT HSSE MONTHLY MEETING - EDISI KEMERDEKAAN

Professional Development

11 Qs

SysOps Evaluation 2

SysOps Evaluation 2

Professional Development

11 Qs

WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Hard

Created by

G3C Team

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the right options to remediate SQL Injection vulnerability

[Multiple Choice]


Prepared Statements


Stored Procedures

Escape all user supplied input

Add HSTS in response headers

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the two insecure algorithms from the below [Multiple choice]


MD5

PBKDF2


Bcrypt


SHA-1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose HTTPS protocol version known to be secure as of date [Single choice]

SSL 3.0

SSL 2.0

TLS 1.0

TLS 1.2

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the vulnerabilities associated with Broken Access Control:

[Multiple Choice]


Vertical Privilege Escalation

Insecure Direct Object References

Local File Inclusion


SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An application implements access control check only on the front-end HTML by disabling a button for normal users [Single choice]


Front end access restriction is the best way to prevent access control issues


Malicious users can enable the button on front end allowing unauthorized access

Front end HTML cannot be modified by malicious users making it a safe implementation


Front end restriction is the only way out, and we have to accept the risk associated

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites? [Single choice]

SQL Injection

XML External Entities


Man in the middle

Cross site scripting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following transactions / activities are to be logged in the applications [Single choice]


Authentication successes and failures

Authorization (access control) failures


Session management failures

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?