Question 1
What does the OWASP Top 10 list represent?
Best websites of the year
The most common and critical web application security vulnerabilities
Certification exams
Programming languages
Question 2
Which vulnerability allows attackers to access resources they shouldn’t due to weak enforcement of user permissions?
Injection
Broken Access Control
Cryptographic Failures
Server-Side Request Forgery
Question 3
How can injection vulnerabilities (like SQL injection) be prevented?
Using weak passwords
Building SQL queries through string concatenation
Using parameterized queries or prepared statements and validating all inputs
Disabling firewalls
Question 4
What type of attack manipulates a web server into making unauthorized HTTP requests to internal resources?
Server-Side Request Forgery (SSRF)
Denial of Service
Cross-Site Scripting
Phishing
Question 5
Which OWASP vulnerability involves apps failing to maintain integrity of their software or data, risking code injection or malicious updates?
Security Misconfiguration
Software and Data Integrity Failures
Whaling
Vishing
There are 5 questions to complete.