19 Jun 2012

OWASP Top Ten Quiz

Thank you for taking the OWASP Top Ten Quiz. For a better idea of application security, please download our free product ThreatModeler to learn more about threat modeling and building secure applications.



OWASP Top 10 Quiz

Please wait while the activity loads.
If this activity does not load, try refreshing your browser. Also, this page requires javascript. Please visit using a browser with javascript enabled.
If loading fails, click here to try again

Congratulations – you have completed OWASP Top 10 Quiz.

You scored %%SCORE%% out of %%TOTAL%%.

Your performance has been rated as %%RATING%%

Your answers are highlighted below.

Question 1
What flaw can lead to exposure of resources or functionality to unintended actors?
A
Insecure Cryptographic Storage
B
Improper Authentication
C
Session Fixation
D
Unvalidated Redirects and Forwards
Question 2
What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?
A
SQL Injection
B
XML Injection
C
OS Commanding
D
Cross Site Request Forgery
Question 3
What is the type of flaw that occurs when untrusted user entered data is sent to the interpreter as part of a query or command?
A
Injection
B
Insecure Direct Object References
C
Insufficient Transport Layer Protection
D
Cross Site Request Forgery
Question 4
For an an indirect reference, what happens if there’s no list of limited values authorized for a user in the direct reference?
A
SQL Injection
B
XML Injection
C
Access to sensitive data possible
D
Brute Forcing of stored encrypted credentials
Question 5
Which threat can be prevented by having unique usernames generated with a high degree of entropy?
A
Authorization Bypass
B
Crypt-analysis of hash values
C
Authentication bypass
D
Spamming
Question 6
What flaw arises from session tokens having poor randomness across a range of values?
A
Session Replay
B
Insecure Direct Object References
C
Session Fixation
D
Session Hijacking
Question 7
Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites.
A
Malware Uploading
B
Man in the middle
C
SQL Injection
D
Cross site scripting.
Question 8
What threat arises from not flagging HTTP cookies with tokens as secure?
A
Insecure Cryptographic Storage
B
Session Replay
C
Access Control Violation
D
Session Hijacking
Question 9
What threat are you vulnerable to if you do not validate authorization of user for direct references to restricted resources?
A
SQL Injection
B
Insecure Direct Object References
C
Cross Site Request Forgery
D
Cross Site Scripting
Question 10
For a connection that changes from HTTP to HTTPS, what flaw arises if you do not change the session identifier?
A
Cross Site Request Forgery
B
Session Hijacking
C
Session Replay
D
Cross Site Scripting
Question 11
Attack that exploits the trust that a site has in a user’s browser.
A
SQL Injection
B
Cross Site Tracing
C
Cross Site Request Forgery
D
Cross Site Scripting
Question 12
Role-Based Access control helps prevent this OWASP Top 10 weakness
A
Security Misconfiguration
B
Unvalidated Redirect or Forward
C
Insufficient Transport Layer Protection
D
Failure to restrict URL Access
Question 13
An attack technique that forces a user’s session credential or session ID to an explicit value.
A
Session Hijacking
B
Dictionary Attack
C
Session Fixation
D
Brute Force Attack
Question 14
For every link or form which invoke state-changing functions with an unpredictable token for each user what attack can be prevented?
A
Cross Site Tracing
B
OS Commanding
C
Cross Site Request Forgery
D
Cross Site Scripting
Question 15
What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?
A
Broken Authentication and Session Management
B
Security Misconfiguration
C
Insecure Direct Object References
D
Cross Site Scripting
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results


There are 15 questions to complete.
List

Return

Shaded items are complete.
1 2 3 4 5
6 7 8 9 10
11 12 13 14 15
End
Return


Leave a Reply