Quiz 5 Flashcards

1
Q

What is the main focus of the OWASP Top 10 list?

Network security issues

Web application security risks

Mobile security vulnerabilities

Physical security threats

A

Web application security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an OWASP Top 10 category?

Malware

Phishing attacks

Injection

Denial of Service (DoS)

A

Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IMPORTANT Which OWASP Top 10 category deals with improper handling of user authentication?

Security Misconfiguration

Cross-Site Scripting (XSS)

Broken Access Control

Broken Authentication

A

Broken Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which OWASP Top 10 risk focuses on security failures related to API keys, credentials, or sensitive data?

Injection

Cryptographic Failures

Vulnerable and Outdated Components

Security Misconfiguration

A

Cryptographic Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IMPORTANT What OWASP Top 10 risk is primarily associated with unvalidated or unsanitized user input, often leading to malicious code execution?

Injection

Security Misconfiguration

Cross-Site Scripting (XSS)

Cryptographic Failures

A

Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following describes the OWASP Top 10 risk “Cryptographic Failures” (formerly Sensitive Data Exposure)?

Allowing long-term session tokens

Incorrect logging of user activity

Failing to limit file upload size

Using deprecated cryptographic algorithms

A

Using deprecated cryptographic algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The OWASP Top 10 risk “Security Misconfiguration” often occurs when:

Passwords are stored in plaintext

Input is not validated

Logging is turned off

Default settings or configurations are use

A

Default settings or configurations are use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the key concern of the OWASP Top 10 (2021) risk “Vulnerable and Outdated Components”?

Poor encryption implementation

Misuse of object serialization

Lack of input validation

Use of unpatched or outdated software components

A

Use of unpatched or outdated software components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which owasp top 10 does the following security vulnerability belong to?

pstmt.setString(1, request.getParameter(“acct”));

ResultSet results = pstmt.executeQuery( );

https://example.com/app/accountInfo?acct=notmyacct

A

Broken Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following best mitigates the risk of “Broken Access Control” as described in OWASP Top 10?

Enforcing least privilege and role-based access control (RBAC)

Validating user input to prevent injection attacks

Implementing Multi-Factor Authentication (MFA)

Using Content Security Policy (CSP) headers

A

Enforcing least privilege and role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly