OWASP Top 10 Flashcards

Open Web Application Security Project

1
Q

What does OWASP stand for?

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which vulnerability allows attackers to inject malicious scripts into web pages viewed by users?

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does CSRF stand for?

A

Cross-Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of SQL Injection (SQLi) attacks?

A

To manipulate or access database data through insecure SQL queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

XSS vulnerabilities can be categorized into three types: ______, ______, and _______.

A

Stored (persistent),
Reflected,
DOM-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which OWASP Top 10 vulnerability allows an attacker to execute unauthorized commands on behalf of a user?

A

Cross-Site Request Forgery (CSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is XSS?

A

Cross-Site Scripting occurs when attacker inject scripts into web pages viewed by users. This can steal user data, modify content, even perform actions on behalf others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a common defense against SQL Injection?

A

Using prepared statements or parameterized queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is CSRF?

A

Cross-Site Request Forgery is an attack were hacker tricks a user into unknowingly performing an unwanted action on a website, where they are logged in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SQLI?

A

SQL Injection is when an attacker injects malicious code into a query, tricking a database into executing unintended commands e.g. leaking user data, bypassing login, deleting records)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to prevent XSS?

A

Input Validation & Sanitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which OWASP Top 10 vulnerability can allow an attacker to steal session cookies?

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of anti-CSRF tokens?

A

To verify that requests are coming from authenticated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multiple choice: Which of the following is a sign of a potential SQL Injection vulnerability? A) User input not validated B) Use of ORM C) Prepared statements D) Strong input sanitization

A

A) User input not validated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: XSS can be exploited even if a web application uses HTTPS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly