OWASP Top 10 Threats and Mitigations Exam - Multiple Select - OWASP
OWASP Top 10 Threats and Mitigations Exam - Multiple Select - OWASP
1) Which of the following consequences are most likely to occur due to an injection attack? (Choose two.)
1. Spoofing
2. Data loss Correct
3. Denial of service Correct
4. Insecure direct object references
3) Which of the following scenarios are most likely to cause an injection attack? (Choose two.)
5) Which of the following are the best ways to protect against injection attacks? (Choose three.)
6) Which of the following are most vulnerable to injection attacks? (Choose two.)
1. Session IDs
2. Registry keys
3. Regular expressions Correct
4. SQL queries based on user input Correct
8) Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.)
9) Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.)
1. Allow list
2. Table indirection Correct
3. Escaping
4. Object class for user input Correct
14) Which of the following languages are the primary targets of cross-site scripting? (Choose two.)
1. HTML Correct
2. SQL
3. XSLT
4. JavaScript Correct
18) Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.)
https://www.linuxsecrets.com/owasp-wiki/index.php/OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select.html 2/9
7/16/2020 OWASP Top 10 Threats and Mitigations Exam - Multiple Select - OWASP
22) Which of the following input sources can be directly controlled by a malicious user? (Choose two.)
1. Window.location Correct
2. GET/POST parameters Correct
3. Server configuration files
4. Ports and network resources
23) Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.)
24) Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.)
26) Which of the following functionalities should you include in an authentication and session management system? (Choose two.)
31) Which of the following are authentication system mandatory requirements? (Choose three.)
32) A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token
should meet which of the following requirements? (Choose two.)
34) Which of the following tasks are performed by a session-based system? (Choose two.)
36) Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.)
1. Files Correct
2. Registry keys Correct
3. Conditional constructs
4. GET/POST parameters
https://www.linuxsecrets.com/owasp-wiki/index.php/OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select.html 4/9
7/16/2020 OWASP Top 10 Threats and Mitigations Exam - Multiple Select - OWASP
37) Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.)
38) Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.)
41) Which of the following threats are most likely to be caused by poor input validation? (Choose three.)
1. Injection Correct
2. Cross-site scripting Correct
3. Insecure direct object reference Correct
4. Insecure cryptographic storage
5. Insufficient transport layer protection
43) Which of the following are the most common results of a cross-site request forgery? (Choose three.)
https://www.linuxsecrets.com/owasp-wiki/index.php/OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select.html 5/9
7/16/2020 OWASP Top 10 Threats and Mitigations Exam - Multiple Select - OWASP
49) Which of the following are most often associated with a security misconfiguration threat? (Choose two.)
51) Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.)
52) Which of the following procedures are involved in the hardening process? (Choose two.)
53) Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging
environments? (Choose two.)
54) Which of the following can result in insecure cryptography? (Choose two.)
2. Unused services
3. Default accounts
4. Failure to rotate keys Correct
55) Which of the following are most likely to result in insecure cryptography? (Choose two.)
56) Which of the following may result in cryptographic weakness? (Choose three.)
57) Which of the following protocols are network layer encryption protocols? (Choose two.)
1. SSL Correct
2. EFS
3. IPSec Correct
4. Kerberos
58) Which of the following factors help you secure keys? (Choose three.)
1. Complexity Correct
2. Rotation Correct
3. Randomness Correct
4. Encryption
https://www.linuxsecrets.com/owasp-wiki/index.php/OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select.html 7/9
7/16/2020 OWASP Top 10 Threats and Mitigations Exam - Multiple Select - OWASP
60) Which of the following depict the typical impact of failure to restrict URL access? (Choose two.)
61) Which of the following actions should you take to verify the implementation of your Web application? (Choose two.)
62) Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.)
1. EFS
2. SSL Correct
3. IPSec Correct
4. Kerberos
63) Which of the following are the best ways to implement transport layer protection? (Choose two.)
1. Install IDS
2. Enable SSL Correct
3. Set the HttpOnly flag on session ID cookies
4. Enable IPSec Correct
65) Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.)
https://www.linuxsecrets.com/owasp-wiki/index.php/OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select.html 8/9
7/16/2020 OWASP Top 10 Threats and Mitigations Exam - Multiple Select - OWASP
69) In which of the following scenarios should you use the escaping technique? (Choose two.)
70) Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.)
https://www.linuxsecrets.com/owasp-wiki/index.php/OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select.html 9/9