OWASP Top 10: Injection Quiz
For any Web Security folks OWASP is the first halt for any information. Be it OWASP Top 10, Security Testing Guide for Pentesters , Code Review Guide for AppSec engineers, ASVS and various OWASP projects. You can play this OWASP Top 10 Injection quiz which you can use for your self-assessment of understanding for OWASP Top 10: A1 which is Injection. This quiz covers very basics of various types of injections older and newer as well according to OWASP top 10 2017. I am sure you will enjoy the questions and we would love to hear your feedback.
This Injection quiz has 10 questions only and you would get 10 minutes to solve all the questions. 70% is the passmark for this quiz. Test yourself, if you can cross 70% score.
If you find any issue in the quiz, please mail us at firstname.lastname@example.org
You can also comment what you think about this quiz content.
0 of 10 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Injection Flaw allows an attacker to execute an arbitrary commands within your application that areCorrectIncorrect
This attack targets the authentication processCorrectIncorrect
This attack targets interactions exploiting applications to penetrate the databases?CorrectIncorrect
What could possible happen with successful code injectionCorrectIncorrect
Possible LDAP injection mitigationCorrectIncorrect
Possible mitigations of SQL Injection are:CorrectIncorrect
1′ or ‘1’ = ‘1 is an example ofCorrectIncorrect
Which of this is not an example of injectionCorrectIncorrect
____________ is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attackerCorrectIncorrect
When you submit malicious code that are stored rather than executed immediately is known asCorrectIncorrect
He is a seasoned professional having 10+ years of experience into Software Development, Python, AWS, Application Security and have an interest in Security Automation.
He is an author and technical reviewers of many technical books associated with PackT and Manning. When he gets free time, he uses to work on his github projects which you can checkout here: Sanjeev’s Git hub repo