OWASP top 10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What vulnerability is described as a failure to enforce and maintain levels of authorization?

Broken Access Control

What vulnerability involves insecure implementations of authentication systems?

Broken Auth

What vulnerability involves unsanitized user input being interpreted as javascript in a browser?

Cross-Site Scripting (XXS)

Insecure Deserialization is NOT particularly dangerous.

False, Insecure Deserialization is very dangerous.

Insufficient Logging and Monitoring is only an issue after an attack has occurred.

False, Insufficient Logging and Monitoring is NOT only an issue after an attack has occurred.

Security Misconfiguration ONLY involves security software.

False, Security Misconfiguration does NOT only involve security software.

What vulnerability involves an interpreter being tricked into treating untrusted data as code/behavior?

Injection

What vulnerability involves a stream of formatted data being maliciously modified before being interpreted as an object within code?

Insecure Deserialization

What vulnerability is characterized by a lack of records and information about the events taking place within a system?

Insufficient Logging and Monitoring

Why is Injection dangerous?

It allows an attacker to view or tamper with data, and possibly run code on the server hosting the website.

Why is Broken Authentication dangerous?

It allows attackers to impersonate other users.

What vulnerability is described as the improper configuration of software in a way that degrades security?

Security Misconfiguration

What vulnerability is described as the insufficient or improper protection of sensitive data?

Sensitive Data Exposure

What is NOT a reason that Sensitive Data Exposure is dangerous?

Sensitive Data Exposure is dangerous because it can allow an attacker to execute arbitrary code on the server running the website.

Broken Access Control can lead to other vulnerabilities being exploited.

True, Broken Access Control can lead to other vulnerabilities being exploited.

In the worst cases, XXE can allow for remote code execution on vulnerable devices.

True, in the worst cases, XXE can allow for remote code execution on vulnerable devices.

Most vulnerabilities that attackers exploit are already public knowledge, and many have fixes readily available for them.

True, most vulnerabilities that attackers exploit are already public knowledge, and many have fixes readily available for them.

Some XSS attacks can involve a website storing malicious code and then displaying it to other users.

True, some XSS attacks can involve a website storing malicious code and then displaying it to other users.

What vulnerability involves using insecure versions of software or frameworks within an environment?

Using Components with Known Vulnerabilities

A piece of maliciously crafted XML manipulates an XML processor to produce unintended behavior. What vulnerability in the OWASP Top 10 best describes this scenario?

XML External Entities


Set pelajaran terkait

Skeletal Vocabulary #1: The Skull

View Set

Chapter 2: Variables and Assignments

View Set

Chapter 24- Urinary System (Question and Answer)

View Set