OWASP TOP 10 2021 Flashcards

1
Q

A01:2021

A

BROKEN ACCESS CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A02:2021

A

CRYPTOGRAPHIC FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A03:2021

A

INJECTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A04:2021

A

INSECURE DESIGN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A05:2021

A

SECURITY MIS-CONFIGURATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A06:2021

A

VULNERABLE AND OUTDATED COMPONENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A07:2021

A

IDENTIFICATION AND AUTHENTICATION FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A08:2021

A

SOFTWARE AND DATA INTEGRITY FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A09:2021

A

SECURITY LOGGING AND MONITORING FAILURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A10:2021

A

SERVER SIDE REQUEST FORGERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MITIGATION FOR BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT IS BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMPACT OF BROKEN ACCESS CONTROL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT ARE CRYPTOGRAPHIC FAILURES

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MITIGATION FOR:
INJECTION

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT ARE INSECURE DESIGNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MITIGATION FOR CRYPTOGRAPHIC FAILURES

17
Q

WHAT ARE INJECTIONS

18
Q

WHAT ARE SECURITY MISCONFIGURATIONS

19
Q

MITIGATION FOR:
SECURITY MISCONFIGURATIONS

20
Q

MITIGATION FOR:
INSECURE DESIGN

21
Q

MITIGATION FOR:
VULNERABLE AND OUTDATED COMPONENTS

22
Q

MITIGATION FOR:
IDENTIFICATION AND AUTHENTICATION FAILURES

23
Q

BUSINESS IMPACT OF: CRYPTOGRAPHIC FAILURES

24
Q

BUSINESS IMPACT OF:
INJECTION

25
Q

BUSINESS IMPACT OF:
INSECURE DESIGN

26
Q

BUSINESS IMPACT OF:
SECURITY MISCONFIGURATIONS

27
Q

BUSINESS IMPACT OF:
VULNERABLE AND OUTDATED COMPONENTS

28
Q

BUSINESS IMPACT OF:
IDENTIFICATION AND AUTHENTICATION FAILURES

29
Q

BUSINESS IMPACT OF:
SECURITY LOGGING AND MONITORING FAILURES

30
Q

BUSINESS IMPACT OF:
SOFTWARE AND DATA INTEGRITY FAILURES

31
Q

BUSINESS IMPACT OF:
SERVER-SIDE REQUEST FORGERY

32
Q

MITIGATION FOR:
SECURITY LOGGING AND MONITORING FAILURES

32
Q

MITIGATION FOR:
SOFTWARE AND DATA INTEGRITY FAILURES

33
Q

MITIGATION FOR:
SERVER-SIDE REQUEST FORGERY

34
Q

WHAT ARE:
VULNERABLE AND OUTDATED COMPONENTS

35
Q

WHAT ARE:
IDENTIFICATION AND AUTHENTICATION FAILURES

36
Q

WHAT ARE:
SOFTWARE AND DATA INTEGRITY FAILURES

37
Q

WHAT ARE: SECURITY LOGGING AND MONITORING FAILURES

38
Q

WHAT ARE:
SERVER-SIDE REQUEST FORGERIES