Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
OWASP Top 10 Vulnerabilities Interview Questions and Answers
Home
Questions
OWASP Top 10 Vulnerabilities
0
votes
Q: Client-side scripts can be allowed to execute in the browsers for needed operations.
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
client-side-script
0
votes
Q: Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
script-execution
0
votes
Q: Which of the following are most likely to result in insecure cryptography?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
insecure-cryptography
0
votes
Q: What is an attack that exploits the trust a site has in a user’s browser?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
user-browser
0
votes
Q: Role-based access control helps prevent which OWASP Top 10 vulnerability?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
owasp
access-control
0
votes
Q: What happens when an application takes user inputted data and sends it to a web browser, without proper validation?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
input-data
web
browser
0
votes
Q: What is an attack that forces a user’s session credential or session ID to an explicit value?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
session-id
user-credential
0
votes
Q: Which of the following languages are the primary targets of cross-site scripting?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
cross-site-scripting
0
votes
Q: What is an example of a session-related vulnerability?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: Which threat can be prevented by having unique usernames generated with a high degree of entropy?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: For a connection that changes from HTTP to HTTPS, what flaw arises if you do not change the session identifier?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: What threat arises from not flagging HTTP cookies with tokens, as secure?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: What attack can be prevented by links or forms that invoke state-changing functions with an unpredictable token for each user?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: Which of the following actions should you take to verify the implementation of a web application?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: Which of the following are the best ways to implement transport layer protection?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: In which of the following scenarios should you use the escaping technique?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: What happens when an application takes user inputted data, and sends it to a web browser without proper validation and escaping?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: Which of the following depict the typical impact of failure to restrict URL access?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: What is the attack technique used to exploit websites by altering the backend database queries through inputting manipulated queries?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: What flaw arises from session tokens having poor randomness across a range of values?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: Which of the following consequences are most likely to occur due to an injection attack?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: Which of the following are the best ways to protect against injection attacks?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: What type of flaw occurs when untrusted user-entered data is sent to the interpreter as part of a query or command?
answered
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
Help get things started by
asking a question
.
...