Lesson 6 - Web Trojan

Lesson 6 - Web Trojan

University

8 Qs

quiz-placeholder

Similar activities

IT Era

IT Era

University

12 Qs

hacking

hacking

University

10 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

cybersecurity

cybersecurity

University

10 Qs

NodeJS Quiz 1

NodeJS Quiz 1

University

9 Qs

Software Engineering CS: 2

Software Engineering CS: 2

University

10 Qs

SAS Cyber Security Competition 2020-2021

SAS Cyber Security Competition 2020-2021

1st Grade - University

9 Qs

Web/System Exploitation

Web/System Exploitation

1st Grade - Professional Development

9 Qs

Lesson 6 - Web Trojan

Lesson 6 - Web Trojan

Assessment

Quiz

Computers

University

Medium

Created by

Babak Brad

Used 30+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A voting website has a form containing HTML code shown in the attached image.

What is the main reason which allows this voting website be easily attacked?

Because the form uses the GET method.

Because the code does not include an encryption algorithm.

Maybe the website is not protected by an Antivirus.

Because the radio button input can be easily modified.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following descriptions defines a Trojan Horse in the context of computer security?

A malicious computer program which appears to be a gift, but it actually is a trap.

A malicious software that when executed can replicates itself by modifying other computer programs and inserting its own code.

Any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of a digital resource.

A weakness in a computer system which can be exploited by an attacker, to perform unauthorized actions within the system.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To protect against Web Trojans, which technique is an appropriate approach to be implemented by developers?

Escaping meta-character

Ticket system

HTML encoding

Regular expression

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Web pages with tickets in them cannot be cacheable.

True

False

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tickets are needed only for requests that actually change something on the server.

True

False

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Using Ticket mechanism to secure a system against the Web Trojan, the system might be still vulnerable if the application is vulnerable to Cross-site Scripting.

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a web application protected by ticket mechanism, in case of session timeout, the application should directly throw away the user's input.

True

False

8.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Ticket system makes it impossible to accidentally perform a request twice, both for POST and GET, as there will be no valid ticket the second time.

True

False