Search Header Logo

CSRF attack

Authored by vn mgm-sp

Computers

KG

Used 37+ times

CSRF attack
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a type of attack that tricks site users or

administrators to unknowingly perform malicious actions for the attacker like changing order values and product prices, transfer funds from one account to another, change user passwords to hijack accounts.

SQL Injection

Cross-Site Scripting (XSS)

Command Injection

File Inclusion (LFI/RFI)

Cross-Site Request Forgery (CSRF)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For every link or form which invoke state-changing functions with an unpredictable token for each user what attack can be prevented?

OS Commanding

Cross-site Scripting

Cross-site Request Forgery

Cross-site tracing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites

SQL injection

Cross Site Scripting

Malware Uploading

Man in the Middle

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

Security Mis-configuration

Cross Site Scripting

Insecure Direct Object Reference

Broken Authentication and Session Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack that exploits the trust that a site has in a user's browser

Session Hijacking

Cross-Site Request Forgery

SQL injection

Cross-Site Scripting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which character is most likely to be used for an SQL injection attack

Single quote (')

Null (\0) byte

Less than sign(<)

Greater than sign(>)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?

Reflected XSS

Persistent XSS

Insecure Direct Object Reference

Failure to Restrict URLs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?