Try to answer these OWASP MCQs and check your understanding of the OWASP subject.
Scroll down and let's begin!
A. SQL Injection
B. Cross site scripting.
C. Malware Uploading
D. Man in the middle
A. Brute Forcing of stored encrypted credentials
B. SQL Injection
C. XML Injection
D. Access to sensitive data possible
A. SQL Injection
B. XML Injection
C. Cross Site Request Forgery
D. OS Commanding
A. Session Fixation
B. Unvalidated Redirects and Forwards
C. Insecure Cryptographic Storage
D. Improper Authentication
A. Cross Site Scripting
B. Cross Site Tracing
C. Cross Site Request Forgery
D. OS Commanding
A. Authentication bypass
B. Crypt-analysis of hash values
C. Spamming
D. Authorization Bypass
A. Security Misconfiguration
B. Broken Authentication and Session Management
C. Cross Site Scripting
D. Insecure Direct Object References
A. Cross domain scandal
B. Data transfer protocol
C. Email Scam
D. Network scandal
A. Users will not have access to and misuse system resources
B. A hacker cannot steal a legitimate user's identity
C. Only the resources authorized for that user will be at risk
D. Hackers will not pose as legitimate users
A. A file that makes it easier to access a Web site and browse
B. A computer virus
C. A file that hackers use to steal your identity
D. Web application file
A. True
B. False
A. Session Hijacking
B. Session Fixation
C. Brute Force Attack
D. Dictionary Attack
A. Unvalidated Redirects and Forwards
B. Session Fixation
C. Improper Authentication
D. Insecure Cryptographic Storage
A. Your mailing address
B. Your Birth Date
C. Your social security number
D. Your modem configuration number
A. Insecure Direct Object References
B. Session Fixation
C. Session Replay
D. Session Hijacking
A. Cross Site Request Forgery
B. Session Hijacking
C. SQL Injection
D. Cross Site Scripting
A. Cross Site Tracing
B. OS Commanding
C. Cross Site Scripting
D. Cross Site Request Forgery
A. Access to sensitive data possible
B. SQL Injection
C. XML Injection
D. Brute Forcing of stored encrypted credentials
A. Session Hijacking
B. Session Replay
C. Insecure Cryptographic Storage
D. Access Control Violation
A. Session Hijacking
B. Cross Site Request Forgery
C. Cross Site Scripting
D. Session Replay