APIsec University - Become an API Security Expert
APIsec University - Become an API Security Expert
Close
Loading...
Question 1
What is the primary difference between authentication and authorization?
Authentication is used for user logins, while authorization is used exclusively for APIs
API endpoints that are too exposed, allowing unauthorized access to business-critical workflows
Failure to properly manage API inventory and documentation, exposing Admin endpoints
Complex access control policies that allow attackers to gain unauthorized access to user
resources or administrative functions
Question 3
Which tool was mentioned as useful for enforcing writing style guidelines in technical
documentation?
BurpSuite
Vale
GitHub Pages
mitmweb2proxy
Question 4
Why is it important to define allowed parameters in your API specification regarding file paths?
2017
2019
2021
2023
Question 6
CORS stands for:
200
404
429
500
Question 10
Why is it important for API documentation to cater to a broad audience?
To ensure both technical and non-technical stakeholders can understand the API
Developers are the ones who ultimately decide on purchasing the product
A great developer experience through clear docs can drive overall business adoption
POP tokens require the sender to prove possession, making them bound to a specific client
Bearer tokens always require an additional PIN code
Bearer tokens use asymmetric signing, while POP tokens use symmetric signing
Switch-case statements
Try-catch blocks
Conditional statements
For loops
Question 19
What is the primary purpose of implementing rate limiting on an API?
API endpoints can be accessed without verifying the identity of the user
Attackers can bypass authentication mechanisms to impersonate users and steal sensitive
information
Question 21
The Instagram password reset flaw is an example of which vulnerability?
Unrestricted Access to Sensitive Business Flows
Security Misconfiguration
Broken Authentication
Question 22
Which is NOT a use case for API Documentation?
Security Misconfiguration
PortSwigger
OWASP ZAP
HTTPX
Burp Decoder
Question 29
In the context of API documentation, what does “governance” refer to?
200
302
400
500
Question 34
When an API needs to call another API using the received token, which of the following
strategies can be employed?
By generating a completely new token from scratch without any relation to the original
By exchanging the token, embedding a nested token, or sharing the original token
APIs exposing sensitive data in responses that can be accessed by unauthorized users
Attackers exploiting APIs to consume bandwidth, CPU, and memory, leading to DoS or increased
costs
Question 36
Why might traditional web application scanners miss many API vulnerabilities?
Ensures that all requests are processed in the order they are received
Question 38
Broken Object Property Level Authorization (sometimes called BOPLA) deals with which of the
following issues?
Broken Authentication
Question 41
What type of vulnerability is characterized by an API allowing users to perform functions (such
as transferring funds) that should be restricted to higher-privileged roles?
Broken Authentication
Question 42
Why should error messages sent to end users be generic?
It can lead to confusion and errors when the docs do not match the API’s actual behavior
Question 44
What issue does “Improper Inventory Management” refer to in API security?
Enabling early feedback, security reviews, and identifying issues before production
Date
Content-Type
Cache-Control
Server
Question 53
In OAuth, what is the main function of the Authorization Server?
To serve as both the username and password in one string for identification
""
"../"
“HTTP/1.1"
“SELECT *”
Question 61
Which of the following is an example of an Injection vulnerability as described in the OWASP
Top 10?
A web application failing to check input for SQL commands, allowing an attacker to manipulate
database queries
By value tokens are self contained, while by reference tokens require an introspection call
By reference tokens are self-contained, while by value tokens require an introspection call
Question 64
Unsafe Consumption of APIs is mostly associated with risks from:
By tricking the server into making requests to unintended URLs, such as internal services
It won’t include the correct parameters for all of the listed endpoints
It may not easily integrate with automated tools or remain in sync with the API
Question 67
What does “error disclosure” refer to in API security?
UI/UX designers, to understand how security issues may impact the user experience
API endpoints fail to validate data inputs, leading to potential data breaches
Attackers can manipulate object identifiers to access unauthorized resources or perform actions
outside their authorization level
Question 71
In the Coinbase example, what was the primary issue that allowed a hacker to sell Ethereum as
Bitcoin?
Product Engineers
Resource Owner
Authorization Server
Client
Encryption Server
Question 79
Which risk category in the 2023 update is a combination of Excessive Data Exposure and Mass
Assignment?
Broken Authentication
Broken Authentication
They are metadata used only for logging purposes encryption in API communication
Question 85
Which is most commonly responsible for authentication breaches?
Unsecured endpoints
Lack of captcha
Any unintended exposure of details about the server’s configuration and technology stack
To allow the client to obtain new access tokens without re-prompting the user for credentials
Rely on sample code from the documentation and modify it for your integration
Read through the endpoints, request formats, and authentication methods before starting
integration
OpenAPI
XML Schema
HTML5