Question
Which of the following OWASP Top 10 risks involves
insecure coding practices that allow attackers to gain access to sensitive data, such as usernames and passwords?Solution
Sensitive Data Exposure occurs when sensitive information, such as passwords, credit card details, or personal data, is not properly protected during storage or transmission. Weak encryption, improper key management, or lack of HTTPS for data in transit are common causes. An attacker can intercept such data using tools like packet sniffers or by exploiting vulnerabilities in the system. For example, an application storing user passwords in plain text instead of hashing them exposes users to credential theft if the database is compromised. Proper encryption, secure transmission (e.g., HTTPS), and adherence to best practices mitigate this risk. Why Other Options Are Incorrect :
- Security Misconfiguration : Refers to improper settings, like default credentials or unpatched software, not direct data exposure.
- Broken Authentication : Involves flawed authentication mechanisms, leading to unauthorized access, not sensitive data compromise.
- Insecure Deserialization : Involves execution of malicious code via tampered serialized objects, not direct data leaks.
- Insufficient Logging and Monitoring : Refers to the inability to detect and respond to security breaches, not data exposure.
Statements:
All pen drives are tablets.
All tablets are cellphones.
Conclusions:
I. At least Some cell phones are pendr...
In the question below some statements are given followed by two conclusions I and II. You have to take the given statements to be true even if they see...
Statements : Â Â Â Â Â Â Â All one are two.
                               All three are two.
   ...
Three statements are given followed by three conclusions numbered I, II, and III assuming the statements to be true, even if they seem to be at varian...
Statement:
Some pens are pencils
Only a few pencils are tables
All tables are notebooks
Conclusion:
I. All pens can b...
In the following question below are given some statements followed by some conclusions based on those statements. Taking the given statements to be tru...
In this question, three statements are given, followed by two conclusions numbered I and II Assuming the statements to be true, even if they seem to be...
In the question below there are three statements followed by two conclusions I and II. You have to take the three given statements to be true even if t...
Conclusions:
I. Some Bikes are not Cars.
II. Every Cars can be Cycles.
Statements:
Statements:
All threads are wools.
Some wools are ropes.
All ropes are chains.
Conclusions:
I. Some wools are ch...