Lesson 6 - Web Trojan

Lesson 6 - Web Trojan

University

8 Qs

quiz-placeholder

Similar activities

Evaluación SENA

Evaluación SENA

University

10 Qs

Quiz on Basics of C

Quiz on Basics of C

University

10 Qs

Firewall e IDS - Segurança de Redes

Firewall e IDS - Segurança de Redes

University

10 Qs

استعني علي الشقا بالله

استعني علي الشقا بالله

University

10 Qs

CHAPTER 5 ONLINE QUIZ

CHAPTER 5 ONLINE QUIZ

University

9 Qs

Javascript

Javascript

University

12 Qs

Los periféricos del computador

Los periféricos del computador

1st Grade - Professional Development

9 Qs

Quiz CodeIgniter 4

Quiz CodeIgniter 4

University

10 Qs

Lesson 6 - Web Trojan

Lesson 6 - Web Trojan

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Babak Brad

Used 34+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A voting website has a form containing HTML code shown in the attached image.

What is the main reason which allows this voting website be easily attacked?

Because the form uses the GET method.

Because the code does not include an encryption algorithm.

Maybe the website is not protected by an Antivirus.

Because the radio button input can be easily modified.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following descriptions defines a Trojan Horse in the context of computer security?

A malicious computer program which appears to be a gift, but it actually is a trap.

A malicious software that when executed can replicates itself by modifying other computer programs and inserting its own code.

Any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of a digital resource.

A weakness in a computer system which can be exploited by an attacker, to perform unauthorized actions within the system.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To protect against Web Trojans, which technique is an appropriate approach to be implemented by developers?

Escaping meta-character

Ticket system

HTML encoding

Regular expression

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Web pages with tickets in them cannot be cacheable.

True

False

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tickets are needed only for requests that actually change something on the server.

True

False

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Using Ticket mechanism to secure a system against the Web Trojan, the system might be still vulnerable if the application is vulnerable to Cross-site Scripting.

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a web application protected by ticket mechanism, in case of session timeout, the application should directly throw away the user's input.

True

False

8.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Ticket system makes it impossible to accidentally perform a request twice, both for POST and GET, as there will be no valid ticket the second time.

True

False