
A03 - Injection Greenbelt session 2025

Quiz
•
Information Technology (IT)
•
Professional Development
•
Easy

G3C Team
Used 2+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the primary reason injection vulnerabilities occur?
Improper authentication
Unvalidated redirects
Unsanitized user input used in commands or queries
Missing session expiration
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which types of injection attacks are included under OWASP A03:2021 ? (Multiple correct answers)
SQL Injection
Command Injection
Cross-Site Request Forgery
LDAP Injection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common impact of a successful SQL injection attack?
Slower page loading
Denial of Service
Broken access control
Unauthorized access to database contents
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the BEST way to prevent injection attacks?
Parameterized queries (prepared statements)
Disabling copy-paste
Input validation with blocklists
Using CAPTCHA
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which languages or technologies are vulnerable to injection attacks? (Multiple correct answers)
Java
PHP
Python
None, if using modern frameworks only
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main reason input sanitization alone is not a foolproof defense against injection ?
It’s only applicable to POST requests
Sanitizers can be bypassed or misused
It converts all input to lowercase
It encrypts user data
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An application allows users to enter their usernames to retrieve profile data but directly inserts that input into a SQL query. What is the vulnerability?
Insecure deserialization
SQL Injection
Broken authentication
XML External Entity
8.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which defenses help mitigate injection vulnerabilities? (Multiple correct answers)
Whitelisting input
Using stored procedures with parameters
Encoding output
Disabling JavaScript
9.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the impacts of SQL Injection vulnerability
Bypass authentication
Data loss
Unauthorized data access
All of the above
Similar Resources on Wayground
10 questions
My SQL

Quiz
•
Professional Development
10 questions
Knowledge Check - 2

Quiz
•
Professional Development
10 questions
Quiz TIK

Quiz
•
Professional Development
10 questions
LINKS Cyber Youth Challenge - Round 3

Quiz
•
Professional Development
14 questions
Security Coding Quiz

Quiz
•
Professional Development
10 questions
SOC Monthly quiz

Quiz
•
Professional Development
14 questions
Network Security Baselines

Quiz
•
Professional Development
10 questions
Criação de tabelas e maniulação de dados nas tabelas com SQL

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade