This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Top 10 Threats and Mitigations Exam - Multiple Select"
Sandra Paiva (talk | contribs) |
Sandra Paiva (talk | contribs) |
||
Line 11: | Line 11: | ||
− | Which of the following consequences are most likely to occur due to an injection attack? (Choose two.) | + | 1) Which of the following consequences are most likely to occur due to an injection attack? (Choose two.) |
# Spoofing | # Spoofing | ||
Line 20: | Line 20: | ||
− | Which of the following scenarios are most likely to cause an injection attack? (Choose two.) | + | 3) Which of the following scenarios are most likely to cause an injection attack? (Choose two.) |
# Unvalidated input is embedded in an instruction stream. '''Correct''' | # Unvalidated input is embedded in an instruction stream. '''Correct''' | ||
Line 29: | Line 29: | ||
− | Which of the following are the best ways to protect against injection attacks? (Choose three.) | + | 5) Which of the following are the best ways to protect against injection attacks? (Choose three.) |
# Block list '''Correct''' | # Block list '''Correct''' | ||
Line 39: | Line 39: | ||
− | Which of the following are most vulnerable to injection attacks? (Choose two.) | + | 6) Which of the following are most vulnerable to injection attacks? (Choose two.) |
# Session IDs | # Session IDs | ||
Line 48: | Line 48: | ||
− | Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.) | + | 8) Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.) |
# Allow list '''Correct''' | # Allow list '''Correct''' | ||
Line 57: | Line 57: | ||
− | Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.) | + | 9) Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.) |
# Allow list | # Allow list | ||
Line 66: | Line 66: | ||
− | Which of the following languages are the primary targets of cross-site scripting? (Choose two.) | + | 14) Which of the following languages are the primary targets of cross-site scripting? (Choose two.) |
# HTML '''Correct''' | # HTML '''Correct''' | ||
Line 75: | Line 75: | ||
− | Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.) | + | 18) Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.) |
# Using allow List '''Correct''' | # Using allow List '''Correct''' | ||
Line 85: | Line 85: | ||
− | Which of the following input sources can be directly controlled by a malicious user? (Choose two.) | + | 22) Which of the following input sources can be directly controlled by a malicious user? (Choose two.) |
# Window.location '''Correct''' | # Window.location '''Correct''' | ||
Line 94: | Line 94: | ||
− | Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.) | + | 23) Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.) |
# Poorly implemented custom code is used. '''Correct''' | # Poorly implemented custom code is used. '''Correct''' | ||
Line 103: | Line 103: | ||
− | Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.) | + | 24) Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.) |
# Find out if a suitable framework component already exists. '''Correct''' | # Find out if a suitable framework component already exists. '''Correct''' | ||
Line 112: | Line 112: | ||
− | Which of the following functionalities should you include in an authentication and session management system? (Choose two.) | + | 26) Which of the following functionalities should you include in an authentication and session management system? (Choose two.) |
# Logout functionality '''Correct''' | # Logout functionality '''Correct''' | ||
Line 121: | Line 121: | ||
− | Which of the following are authentication system mandatory requirements? (Choose three.) | + | 31) Which of the following are authentication system mandatory requirements? (Choose three.) |
# Strong passwords are required. '''Correct''' | # Strong passwords are required. '''Correct''' | ||
Line 131: | Line 131: | ||
− | A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? (Choose two.) | + | 32) A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? (Choose two.) |
# It should identify returning users to the site. | # It should identify returning users to the site. | ||
Line 140: | Line 140: | ||
− | Which of the following tasks are performed by a session-based system? (Choose two.) | + | 34) Which of the following tasks are performed by a session-based system? (Choose two.) |
# Identifying returning users '''Correct''' | # Identifying returning users '''Correct''' | ||
Line 149: | Line 149: | ||
− | Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.) | + | 36) Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.) |
# Files '''Correct''' | # Files '''Correct''' | ||
Line 158: | Line 158: | ||
− | Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.) | + | 37) Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.) |
# Executing commands on the server. | # Executing commands on the server. | ||
Line 168: | Line 168: | ||
− | Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.) | + | 38) Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.) |
# Use session-based indirection. '''Correct''' | # Use session-based indirection. '''Correct''' | ||
Line 177: | Line 177: | ||
− | Which of the following threats are most likely to be caused by poor input validation? (Choose three.) | + | 41) Which of the following threats are most likely to be caused by poor input validation? (Choose three.) |
# Injection '''Correct''' | # Injection '''Correct''' | ||
Line 187: | Line 187: | ||
− | Which of the following are the most common results of a cross-site request forgery? (Choose three.) | + | 43) Which of the following are the most common results of a cross-site request forgery? (Choose three.) |
# Elevation of privilege '''Correct''' | # Elevation of privilege '''Correct''' | ||
Line 197: | Line 197: | ||
− | Which of the following are most often associated with a security misconfiguration threat? (Choose two.) | + | 49) Which of the following are most often associated with a security misconfiguration threat? (Choose two.) |
# Unused services '''Correct''' | # Unused services '''Correct''' | ||
Line 206: | Line 206: | ||
− | Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.) | + | 51) Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.) |
# Add or remove network segments. '''Correct''' | # Add or remove network segments. '''Correct''' | ||
Line 215: | Line 215: | ||
− | Which of the following procedures are involved in the hardening process? (Choose two.) | + | 52) Which of the following procedures are involved in the hardening process? (Choose two.) |
# Disable unnecessary features. '''Correct''' | # Disable unnecessary features. '''Correct''' | ||
Line 224: | Line 224: | ||
− | Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging environments? (Choose two.) | + | 53) Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging environments? (Choose two.) |
# Your application may not work as expected. '''Correct''' | # Your application may not work as expected. '''Correct''' | ||
Line 233: | Line 233: | ||
− | Which of the following can result in insecure cryptography? (Choose two.) | + | 54) Which of the following can result in insecure cryptography? (Choose two.) |
# Unsalted hash '''Correct''' | # Unsalted hash '''Correct''' | ||
Line 242: | Line 242: | ||
− | Which of the following are most likely to result in insecure cryptography? (Choose two.) | + | 55) Which of the following are most likely to result in insecure cryptography? (Choose two.) |
# Custom cryptographic algorithms '''Correct''' | # Custom cryptographic algorithms '''Correct''' | ||
Line 251: | Line 251: | ||
− | Which of the following may result in cryptographic weakness? (Choose three.) | + | 56) Which of the following may result in cryptographic weakness? (Choose three.) |
# Poor/weak algorithm choice '''Correct''' | # Poor/weak algorithm choice '''Correct''' | ||
Line 261: | Line 261: | ||
− | Which of the following protocols are network layer encryption protocols? (Choose two.) | + | 57) Which of the following protocols are network layer encryption protocols? (Choose two.) |
# SSL '''Correct''' | # SSL '''Correct''' | ||
Line 270: | Line 270: | ||
− | Which of the following factors help you secure keys? (Choose three.) | + | 58) Which of the following factors help you secure keys? (Choose three.) |
# Complexity '''Correct''' | # Complexity '''Correct''' | ||
Line 279: | Line 279: | ||
− | Which of the following depict the typical impact of failure to restrict URL access? (Choose two.) | + | 60) Which of the following depict the typical impact of failure to restrict URL access? (Choose two.) |
# Attackers access other users’ accounts and data. '''Correct''' | # Attackers access other users’ accounts and data. '''Correct''' | ||
Line 288: | Line 288: | ||
− | Which of the following actions should you take to verify the implementation of your Web application? (Choose two.) | + | 61) Which of the following actions should you take to verify the implementation of your Web application? (Choose two.) |
# Use policy mechanisms. | # Use policy mechanisms. | ||
Line 297: | Line 297: | ||
− | Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.) | + | 62) Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.) |
# EFS | # EFS | ||
Line 306: | Line 306: | ||
− | Which of the following are the best ways to implement transport layer protection? (Choose two.) | + | 63) Which of the following are the best ways to implement transport layer protection? (Choose two.) |
# Install IDS | # Install IDS | ||
Line 315: | Line 315: | ||
− | Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.) | + | 65) Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.) |
# Validate the referrer header '''Correct''' | # Validate the referrer header '''Correct''' | ||
Line 324: | Line 324: | ||
− | In which of the following scenarios should you use the escaping technique? (Choose two.) | + | 69) In which of the following scenarios should you use the escaping technique? (Choose two.) |
# When user input is echoed back to the user in HTML '''Correct''' | # When user input is echoed back to the user in HTML '''Correct''' | ||
Line 333: | Line 333: | ||
− | Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.) | + | 70) Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.) |
# Use an allow list, such as table indirection. '''Correct''' | # Use an allow list, such as table indirection. '''Correct''' |
Latest revision as of 18:05, 4 August 2011
Last updated 4 Aug 11
1) Which of the following consequences are most likely to occur due to an injection attack? (Choose two.)
- Spoofing
- Data loss Correct
- Denial of service Correct
- Insecure direct object references
3) Which of the following scenarios are most likely to cause an injection attack? (Choose two.)
- Unvalidated input is embedded in an instruction stream. Correct
- Unvalidated input cannot be distinguished from valid instructions. Correct
- A Web application does not validate a client’s access to a resource.
- A Web action performs an operation on behalf of the user without checking a shared secret.
5) Which of the following are the best ways to protect against injection attacks? (Choose three.)
- Block list Correct
- Allow list Correct
- Escaping Correct
- Memory size checks
- Validate integer values before referencing arrays
6) Which of the following are most vulnerable to injection attacks? (Choose two.)
- Session IDs
- Registry keys
- Regular expressions Correct
- SQL queries based on user input Correct
8) Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.)
- Allow list Correct
- Block list Correct
- Table indirection
- Escaping
9) Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.)
- Allow list
- Table indirection Correct
- Escaping
- Object class for user input Correct
14) Which of the following languages are the primary targets of cross-site scripting? (Choose two.)
- HTML Correct
- SQL
- XSLT
- JavaScript Correct
18) Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.)
- Using allow List Correct
- Using block list Correct
- Using escaping Correct
- Using encryption
- Using table indirection
22) Which of the following input sources can be directly controlled by a malicious user? (Choose two.)
- Window.location Correct
- GET/POST parameters Correct
- Server configuration files
- Ports and network resources
23) Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.)
- Poorly implemented custom code is used. Correct
- Misconfigured off-the-shelf code is used. Correct
- Unused and unnecessary services, code, and DLLs are disabled.
- The HttpOnly flag is set in cookies.
24) Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.)
- Find out if a suitable framework component already exists. Correct
- Find out if you can use a small extension to an existing component to implement the system. Correct
- Find out if form variables are available to store data.
- Find out if you need to use session-based indirection.
26) Which of the following functionalities should you include in an authentication and session management system? (Choose two.)
- Logout functionality Correct
- Inactivity timeout functionality Correct
- Escaping functionality
- Forwarding system functionality
31) Which of the following are authentication system mandatory requirements? (Choose three.)
- Strong passwords are required. Correct
- Use a GOTCHA to prevent automated attacks.
- User logout and session inactivity are required. Correct
- Session IDs are only accepted from cookies and parameter variables.
- Credentials are always protected with encryption or cryptographic salting and hashing. Correct
32) A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? (Choose two.)
- It should identify returning users to the site.
- It should be used as a replacement for a user's credentials. Correct
- It should always use a persistent cookie.
- It should always use a non-persistent cookie. Correct
34) Which of the following tasks are performed by a session-based system? (Choose two.)
- Identifying returning users Correct
- Providing access to restricted resources Correct
- Using the HTTP protocol
- Sending successful logins to a well-known location
36) Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.)
- Files Correct
- Registry keys Correct
- Conditional constructs
- GET/POST parameters
37) Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.)
- Executing commands on the server.
- Impersonating any user on the system.
- Modifying SQL data pointed to by the query.
- Modifying data without authorization. Correct
- Accessing a resource without authorization. Correct
38) Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.)
- Use session-based indirection. Correct
- Use POST parameters instead of GET parameters.
- Perform an access check each time a resource identifier arrives as input. Correct
- Send successful logins to a well-known location instead of automatic redirection.
41) Which of the following threats are most likely to be caused by poor input validation? (Choose three.)
- Injection Correct
- Cross-site scripting Correct
- Insecure direct object reference Correct
- Insecure cryptographic storage
- Insufficient transport layer protection
43) Which of the following are the most common results of a cross-site request forgery? (Choose three.)
- Elevation of privilege Correct
- Denial of service Correct
- Spoofing and tampering Correct
- Enabling of IPSec
- Misconfigured or disabled security features
49) Which of the following are most often associated with a security misconfiguration threat? (Choose two.)
- Unused services Correct
- Default accounts Correct
- Bad cryptography
- Unsafe key storage
51) Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.)
- Add or remove network segments. Correct
- Apply the latest service packs, patches, hotfixes, and updates. Correct
- Use custom cryptographic algorithms.
- Use your browser to forge unauthorized requests.
52) Which of the following procedures are involved in the hardening process? (Choose two.)
- Disable unnecessary features. Correct
- Review all settings/configurations. Correct
- Repeat the process at random intervals.
- Update the environment with changes only when needed.
53) Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging environments? (Choose two.)
- Your application may not work as expected. Correct
- Your application may not authenticate users as expected. Correct
- Your application may be expensive to administer.
- Your application may have too many configuration files.
54) Which of the following can result in insecure cryptography? (Choose two.)
- Unsalted hash Correct
- Unused services
- Default accounts
- Failure to rotate keys Correct
55) Which of the following are most likely to result in insecure cryptography? (Choose two.)
- Custom cryptographic algorithms Correct
- Unsalted hash Correct
- New products
- Missing patches
56) Which of the following may result in cryptographic weakness? (Choose three.)
- Poor/weak algorithm choice Correct
- Custom cryptographic algorithms Correct
- Insufficient cryptographic protocols Correct
- Missing patches
- Unnecessary/unused services or features
57) Which of the following protocols are network layer encryption protocols? (Choose two.)
- SSL Correct
- EFS
- IPSec Correct
- Kerberos
58) Which of the following factors help you secure keys? (Choose three.)
- Complexity Correct
- Rotation Correct
- Randomness Correct
- Encryption
60) Which of the following depict the typical impact of failure to restrict URL access? (Choose two.)
- Attackers access other users’ accounts and data. Correct
- Attackers impersonate any user on the system.
- Attackers invoke functions and services they have no authorization for. Correct
- Attackers perform all actions that the victims themselves have permission to perform.
61) Which of the following actions should you take to verify the implementation of your Web application? (Choose two.)
- Use policy mechanisms.
- Use a simple and positive model at every layer.
- Verify that each URL in your application is appropriately protected. Correct
- Use your browser to forge unauthorized requests. Correct
62) Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.)
- EFS
- SSL Correct
- IPSec Correct
- Kerberos
63) Which of the following are the best ways to implement transport layer protection? (Choose two.)
- Install IDS
- Enable SSL Correct
- Set the HttpOnly flag on session ID cookies
- Enable IPSec Correct
65) Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.)
- Validate the referrer header Correct
- Use extended validation certificates
- Validate all input from the client Correct
- Disallow requests to unauthorized file types
69) In which of the following scenarios should you use the escaping technique? (Choose two.)
- When user input is echoed back to the user in HTML Correct
- When you need to validate any input as valid input
- When you are trying to protect against regular expression injection
- When you need to tell the interpreter that input is data and not code Correct
70) Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.)
- Use an allow list, such as table indirection. Correct
- Use client-side validation.
- Allow only relative redirects. Correct
- Use session-based indirection.