,OWASP WEEK 1-8 QUIZZES QUESTIONS WITH
SOLVED SOLUTIONS, GRADED A+
Of the following, which is not a recommended way to help mitigate broken
function level authorization?
A) Perform authorization checks based on a user's group and role
B) Separate API endpoints for regular and administrative functionality
C) Use client-based authorization components outside application code
D) Limit access using a web application firewall or API gateway Answer - Use
client-based authorization components outside application code
An application that fails to protect data from unauthorized access has failed
which security goal?
A) Availability
B) Confidentiality
C) Integrity
D) Cryptography Answer - Confidentiality
A weakness in your application that lets an attacker force it to behave in an
unintended manner is referred to as a(n):
A) Threat
B) Exploit
C) Countermeasure
D) Vulnerability Answer - Vulnerability
,An application that becomes inaccessible to users when attacked has failed
which security goal?
A. Availability
B. Accessibility
C. Confidentiality
D. Integrity Answer - Availability
True or False: A strong password is all you need to ensure your privacy is not
compromised. A. True
B. False Answer - FALSE
True or False:
Access Controls limit access to resources on a 'need to know' basis, generally
implemented as privilege levels of users.
A. True
B. False Answer - TRUE
Which one of the following best describes an exploit? Answer - An exploit is a
malicious set of commands used to take advantage of one or more
vulnerabilities in your applications.
An application that fails to protect data from unauthorized access has failed
which security goal? Answer - Confidentiality
A weakness in your application that lets an attacker force it to behave in an
unintended manner is referred to as a(n): Answer - Vulnerability
True or False:
, Application security efforts are more expensive at the end of a software
development lifecycle than at the beginning.
A. True
B. False Answer - TRUE
When and/or where should an application perform canonicalization of input
data?
A. Always on the client-side
B. On the server after receiving data from the client
C. On the client after rendering the server response
D. After form data entry but before sending to server Answer - On the server
after receiving data from the client
All of the following are true about the principle of least privilege except:
A. It makes it more difficult to execute lateral attacks
B. It limits the scope and impact of successful attacks
C. User input cannot affect application output
D. It reduces the application's attack surface Answer - User input cannot affect
application output
Public key cryptography provides integrity via:
A. Digital signatures
B. Asymmetric encryption
C. Symmetric encryption
D. Public key certificates Answer - Digital signatures
True or False:
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $27.99. You're not tied to anything after your purchase.