Lesson 6 - Web Trojan

Quiz
•
Computers
•
University
•
Easy
Babak Brad
Used 34+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A voting website has a form containing HTML code shown in the attached image.
What is the main reason which allows this voting website be easily attacked?
Because the form uses the GET method.
Because the code does not include an encryption algorithm.
Maybe the website is not protected by an Antivirus.
Because the radio button input can be easily modified.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following descriptions defines a Trojan Horse in the context of computer security?
A malicious computer program which appears to be a gift, but it actually is a trap.
A malicious software that when executed can replicates itself by modifying other computer programs and inserting its own code.
Any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of a digital resource.
A weakness in a computer system which can be exploited by an attacker, to perform unauthorized actions within the system.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
To protect against Web Trojans, which technique is an appropriate approach to be implemented by developers?
Escaping meta-character
Ticket system
HTML encoding
Regular expression
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Web pages with tickets in them cannot be cacheable.
True
False
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Tickets are needed only for requests that actually change something on the server.
True
False
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Using Ticket mechanism to secure a system against the Web Trojan, the system might be still vulnerable if the application is vulnerable to Cross-site Scripting.
True
False
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In a web application protected by ticket mechanism, in case of session timeout, the application should directly throw away the user's input.
True
False
8.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ticket system makes it impossible to accidentally perform a request twice, both for POST and GET, as there will be no valid ticket the second time.
True
False
Similar Resources on Wayground
9 questions
Chapter 4 (fundamentals of Cybersecurity)

Quiz
•
University
10 questions
hacking

Quiz
•
University
12 questions
Mobile Learning Quiz 1

Quiz
•
KG - University
10 questions
Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Quiz
•
9th Grade - University
10 questions
Lecture 4

Quiz
•
University
10 questions
HACC Quizz

Quiz
•
University
13 questions
305 - DAY 5

Quiz
•
University
10 questions
Chapter 5 SAD

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade