This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Top 10 Threats and Mitigations Exam - Multiple Select
Last updated 4 Aug 11
1) Which of the following consequences are most likely to occur due to an injection attack? (Choose two.)
- Spoofing
- Data loss Correct
- Denial of service Correct
- Insecure direct object references
3) Which of the following scenarios are most likely to cause an injection attack? (Choose two.)
- Unvalidated input is embedded in an instruction stream. Correct
- Unvalidated input cannot be distinguished from valid instructions. Correct
- A Web application does not validate a client’s access to a resource.
- A Web action performs an operation on behalf of the user without checking a shared secret.
5) Which of the following are the best ways to protect against injection attacks? (Choose three.)
- Block list Correct
- Allow list Correct
- Escaping Correct
- Memory size checks
- Validate integer values before referencing arrays
6) Which of the following are most vulnerable to injection attacks? (Choose two.)
- Session IDs
- Registry keys
- Regular expressions Correct
- SQL queries based on user input Correct
8) Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.)
- Allow list Correct
- Block list Correct
- Table indirection
- Escaping
9) Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.)
- Allow list
- Table indirection Correct
- Escaping
- Object class for user input Correct
14) Which of the following languages are the primary targets of cross-site scripting? (Choose two.)
- HTML Correct
- SQL
- XSLT
- JavaScript Correct
18) Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.)
- Using allow List Correct
- Using block list Correct
- Using escaping Correct
- Using encryption
- Using table indirection
22) Which of the following input sources can be directly controlled by a malicious user? (Choose two.)
- Window.location Correct
- GET/POST parameters Correct
- Server configuration files
- Ports and network resources
23) Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.)
- Poorly implemented custom code is used. Correct
- Misconfigured off-the-shelf code is used. Correct
- Unused and unnecessary services, code, and DLLs are disabled.
- The HttpOnly flag is set in cookies.
24) Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.)
- Find out if a suitable framework component already exists. Correct
- Find out if you can use a small extension to an existing component to implement the system. Correct
- Find out if form variables are available to store data.
- Find out if you need to use session-based indirection.
26) Which of the following functionalities should you include in an authentication and session management system? (Choose two.)
- Logout functionality Correct
- Inactivity timeout functionality Correct
- Escaping functionality
- Forwarding system functionality
31) Which of the following are authentication system mandatory requirements? (Choose three.)
- Strong passwords are required. Correct
- Use a GOTCHA to prevent automated attacks.
- User logout and session inactivity are required. Correct
- Session IDs are only accepted from cookies and parameter variables.
- Credentials are always protected with encryption or cryptographic salting and hashing. Correct
32) A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? (Choose two.)
- It should identify returning users to the site.
- It should be used as a replacement for a user's credentials. Correct
- It should always use a persistent cookie.
- It should always use a non-persistent cookie. Correct
34) Which of the following tasks are performed by a session-based system? (Choose two.)
- Identifying returning users Correct
- Providing access to restricted resources Correct
- Using the HTTP protocol
- Sending successful logins to a well-known location
36) Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.)
- Files Correct
- Registry keys Correct
- Conditional constructs
- GET/POST parameters
37) Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.)
- Executing commands on the server.
- Impersonating any user on the system.
- Modifying SQL data pointed to by the query.
- Modifying data without authorization. Correct
- Accessing a resource without authorization. Correct
38) Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.)
- Use session-based indirection. Correct
- Use POST parameters instead of GET parameters.
- Perform an access check each time a resource identifier arrives as input. Correct
- Send successful logins to a well-known location instead of automatic redirection.
41) Which of the following threats are most likely to be caused by poor input validation? (Choose three.)
- Injection Correct
- Cross-site scripting Correct
- Insecure direct object reference Correct
- Insecure cryptographic storage
- Insufficient transport layer protection
43) Which of the following are the most common results of a cross-site request forgery? (Choose three.)
- Elevation of privilege Correct
- Denial of service Correct
- Spoofing and tampering Correct
- Enabling of IPSec
- Misconfigured or disabled security features
49) Which of the following are most often associated with a security misconfiguration threat? (Choose two.)
- Unused services Correct
- Default accounts Correct
- Bad cryptography
- Unsafe key storage
51) Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.)
- Add or remove network segments. Correct
- Apply the latest service packs, patches, hotfixes, and updates. Correct
- Use custom cryptographic algorithms.
- Use your browser to forge unauthorized requests.
52) Which of the following procedures are involved in the hardening process? (Choose two.)
- Disable unnecessary features. Correct
- Review all settings/configurations. Correct
- Repeat the process at random intervals.
- Update the environment with changes only when needed.
53) Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging environments? (Choose two.)
- Your application may not work as expected. Correct
- Your application may not authenticate users as expected. Correct
- Your application may be expensive to administer.
- Your application may have too many configuration files.
54) Which of the following can result in insecure cryptography? (Choose two.)
- Unsalted hash Correct
- Unused services
- Default accounts
- Failure to rotate keys Correct
55) Which of the following are most likely to result in insecure cryptography? (Choose two.)
- Custom cryptographic algorithms Correct
- Unsalted hash Correct
- New products
- Missing patches
56) Which of the following may result in cryptographic weakness? (Choose three.)
- Poor/weak algorithm choice Correct
- Custom cryptographic algorithms Correct
- Insufficient cryptographic protocols Correct
- Missing patches
- Unnecessary/unused services or features
57) Which of the following protocols are network layer encryption protocols? (Choose two.)
- SSL Correct
- EFS
- IPSec Correct
- Kerberos
58) Which of the following factors help you secure keys? (Choose three.)
- Complexity Correct
- Rotation Correct
- Randomness Correct
- Encryption
60) Which of the following depict the typical impact of failure to restrict URL access? (Choose two.)
- Attackers access other users’ accounts and data. Correct
- Attackers impersonate any user on the system.
- Attackers invoke functions and services they have no authorization for. Correct
- Attackers perform all actions that the victims themselves have permission to perform.
61) Which of the following actions should you take to verify the implementation of your Web application? (Choose two.)
- Use policy mechanisms.
- Use a simple and positive model at every layer.
- Verify that each URL in your application is appropriately protected. Correct
- Use your browser to forge unauthorized requests. Correct
62) Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.)
- EFS
- SSL Correct
- IPSec Correct
- Kerberos
63) Which of the following are the best ways to implement transport layer protection? (Choose two.)
- Install IDS
- Enable SSL Correct
- Set the HttpOnly flag on session ID cookies
- Enable IPSec Correct
65) Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.)
- Validate the referrer header Correct
- Use extended validation certificates
- Validate all input from the client Correct
- Disallow requests to unauthorized file types
69) In which of the following scenarios should you use the escaping technique? (Choose two.)
- When user input is echoed back to the user in HTML Correct
- When you need to validate any input as valid input
- When you are trying to protect against regular expression injection
- When you need to tell the interpreter that input is data and not code Correct
70) Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.)
- Use an allow list, such as table indirection. Correct
- Use client-side validation.
- Allow only relative redirects. Correct
- Use session-based indirection.