Question
Which of the following is NOT among the OWASP Top 10
Web Security Risks?Solution
The OWASP Top 10 is a list of the most critical security risks for web applications, published by the Open Web Application Security Project (OWASP). It focuses exclusively on software vulnerabilities, such as:
- Injection attacks: Exploits flaws in input handling to execute unintended commands (e.g., SQL injection).
- Broken access control: Occurs when applications fail to enforce proper restrictions on user actions.
- IDOR: A type of access control issue where attackers manipulate references to objects (e.g., file paths) to access unauthorized data.
- Security misconfigurations: Includes improper settings in databases, servers, or frameworks that expose systems to attacks.
- Option A, B, C, and E: These are well-documented OWASP Top 10 vulnerabilities and remain significant threats in web application security.
As per the provision of Section 40 of the Companies Act, 2013, the commission paid or agreed to be paid does NOT exceed in the case of debentures _____o...
In the PM Vishwakarma Scheme, artisans are provided with a toolkit grant of how much?
A construction company signs a ₹50 crore contract for building a bridge over 5 years. It recognizes revenue based on the percentage-of-completion meth...
Which Section of the Insurance Act defines ‘General Insurance Business’?
Accounting Standard 2 (Revised) provides the _______ Â method for computing the cost of inventories.
If net profit is ₹1,20,000 and total sales is ₹8,00,000, what is the Net Profit Margin, as per Vertical Analysis?
The accounting rule, "Debit all ___________, credit all gains & income" pertains to ____ accounts.
A company follows FIFO method of inventory valuation every year. Which accounting principle is being followed?
The UTGST Act, 2017 is applicable to Union-Territories except:
A business has the following inventory transactions:
• Opening Stock: 100 units @ ₹10
• Purchases: 200 units @ ₹12
• Sale...