OWASP TOP 10 2021 Flashcards

1
Q

A01:2021

A

BROKEN ACCESS CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A02:2021

A

CRYPTOGRAPHIC FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A03:2021

A

INJECTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A04:2021

A

INSECURE DESIGN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A05:2021

A

SECURITY MIS-CONFIGURATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A06:2021

A

VULNERABLE AND OUTDATED COMPONENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A07:2021

A

IDENTIFICATION AND AUTHENTICATION FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A08:2021

A

SOFTWARE AND DATA INTEGRITY FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A09:2021

A

SECURITY LOGGING AND MONITORING FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A10:2021

A

SERVER SIDE REQUEST FORGERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MITIGATION FOR BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT IS BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMPACT OF BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT ARE CRYPTOGRAPHIC FAILURES

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MITIGATION FOR:
INJECTION

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT ARE INSECURE DESIGNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MITIGATION FOR CRYPTOGRAPHIC FAILURES

A
17
Q

WHAT ARE INJECTIONS

A
18
Q

WHAT ARE SECURITY MISCONFIGURATIONS

A
19
Q

MITIGATION FOR:
SECURITY MISCONFIGURATIONS

A
20
Q

MITIGATION FOR:
INSECURE DESIGN

A
21
Q

MITIGATION FOR:
VULNERABLE AND OUTDATED COMPONENTS

A
22
Q

MITIGATION FOR:
IDENTIFICATION AND AUTHENTICATION FAILURES

A
23
Q

BUSINESS IMPACT OF: CRYPTOGRAPHIC FAILURES

A
24
Q

BUSINESS IMPACT OF:
INJECTION

A
25
Q

BUSINESS IMPACT OF:
INSECURE DESIGN

A
26
Q

BUSINESS IMPACT OF:
SECURITY MISCONFIGURATIONS

A
27
Q

BUSINESS IMPACT OF:
VULNERABLE AND OUTDATED COMPONENTS

A
28
Q

BUSINESS IMPACT OF:
IDENTIFICATION AND AUTHENTICATION FAILURES

A
29
Q

BUSINESS IMPACT OF:
SECURITY LOGGING AND MONITORING FAILURES

A
30
Q

BUSINESS IMPACT OF:
SOFTWARE AND DATA INTEGRITY FAILURES

A
31
Q

BUSINESS IMPACT OF:
SERVER-SIDE REQUEST FORGERY

A
32
Q

MITIGATION FOR:
SECURITY LOGGING AND MONITORING FAILURES

A
32
Q

MITIGATION FOR:
SOFTWARE AND DATA INTEGRITY FAILURES

A
33
Q

MITIGATION FOR:
SERVER-SIDE REQUEST FORGERY

A
34
Q

WHAT ARE:
VULNERABLE AND OUTDATED COMPONENTS

A
35
Q

WHAT ARE:
IDENTIFICATION AND AUTHENTICATION FAILURES

A
36
Q

WHAT ARE:
SOFTWARE AND DATA INTEGRITY FAILURES

A
37
Q

WHAT ARE: SECURITY LOGGING AND MONITORING FAILURES

A
38
Q

WHAT ARE:
SERVER-SIDE REQUEST FORGERIES

A