OWASP TOP 10 2021 Flashcards

1
Q

A01:2021

A

BROKEN ACCESS CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A02:2021

A

CRYPTOGRAPHIC FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A03:2021

A

INJECTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A04:2021

A

INSECURE DESIGN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A05:2021

A

SECURITY MIS-CONFIGURATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A06:2021

A

VULNERABLE AND OUTDATED COMPONENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A07:2021

A

IDENTIFICATION AND AUTHENTICATION FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A08:2021

A

SOFTWARE AND DATA INTEGRITY FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A09:2021

A

SECURITY LOGGING AND MONITORING FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A10:2021

A

SERVER SIDE REQUEST FORGERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MITIGATION FOR BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT IS BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMPACT OF BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT ARE CRYPTOGRAPHIC FAILURES

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MITIGATION FOR:
INJECTION

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT ARE INSECURE DESIGNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MITIGATION FOR CRYPTOGRAPHIC FAILURES

17
Q

WHAT ARE INJECTIONS

18
Q

WHAT ARE SECURITY MISCONFIGURATIONS

19
Q

MITIGATION FOR:
SECURITY MISCONFIGURATIONS

20
Q

MITIGATION FOR:
INSECURE DESIGN

21
Q

MITIGATION FOR:
VULNERABLE AND OUTDATED COMPONENTS

22
Q

MITIGATION FOR:
IDENTIFICATION AND AUTHENTICATION FAILURES

23
Q

BUSINESS IMPACT OF: CRYPTOGRAPHIC FAILURES

24
BUSINESS IMPACT OF: INJECTION
25
BUSINESS IMPACT OF: INSECURE DESIGN
26
BUSINESS IMPACT OF: SECURITY MISCONFIGURATIONS
27
BUSINESS IMPACT OF: VULNERABLE AND OUTDATED COMPONENTS
28
BUSINESS IMPACT OF: IDENTIFICATION AND AUTHENTICATION FAILURES
29
BUSINESS IMPACT OF: SECURITY LOGGING AND MONITORING FAILURES
30
BUSINESS IMPACT OF: SOFTWARE AND DATA INTEGRITY FAILURES
31
BUSINESS IMPACT OF: SERVER-SIDE REQUEST FORGERY
32
MITIGATION FOR: SECURITY LOGGING AND MONITORING FAILURES
32
MITIGATION FOR: SOFTWARE AND DATA INTEGRITY FAILURES
33
MITIGATION FOR: SERVER-SIDE REQUEST FORGERY
34
WHAT ARE: VULNERABLE AND OUTDATED COMPONENTS
35
WHAT ARE: IDENTIFICATION AND AUTHENTICATION FAILURES
36
WHAT ARE: SOFTWARE AND DATA INTEGRITY FAILURES
37
WHAT ARE: SECURITY LOGGING AND MONITORING FAILURES
38
WHAT ARE: SERVER-SIDE REQUEST FORGERIES