CSRF attack

CSRF attack

KG

25 Qs

quiz-placeholder

Similar activities

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

Cyber 3 Unit 3 Review Game

Cyber 3 Unit 3 Review Game

11th - 12th Grade

20 Qs

AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

11th - 12th Grade

21 Qs

Web Tech - Web Design

Web Tech - Web Design

10th - 12th Grade

20 Qs

Unit 7 Quiz Review

Unit 7 Quiz Review

9th - 12th Grade

20 Qs

Lesson 4 DDOS and Bots

Lesson 4 DDOS and Bots

8th Grade

20 Qs

032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

9th Grade - University

20 Qs

Web Application Security Testing-PreTest

Web Application Security Testing-PreTest

Professional Development

20 Qs

CSRF attack

CSRF attack

Assessment

Quiz

Computers

KG

Medium

Created by

vn mgm-sp

Used 35+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a type of attack that tricks site users or

administrators to unknowingly perform malicious actions for the attacker like changing order values and product prices, transfer funds from one account to another, change user passwords to hijack accounts.

SQL Injection

Cross-Site Scripting (XSS)

Command Injection

File Inclusion (LFI/RFI)

Cross-Site Request Forgery (CSRF)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For every link or form which invoke state-changing functions with an unpredictable token for each user what attack can be prevented?

OS Commanding

Cross-site Scripting

Cross-site Request Forgery

Cross-site tracing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites

SQL injection

Cross Site Scripting

Malware Uploading

Man in the Middle

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

Security Mis-configuration

Cross Site Scripting

Insecure Direct Object Reference

Broken Authentication and Session Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack that exploits the trust that a site has in a user's browser

Session Hijacking

Cross-Site Request Forgery

SQL injection

Cross-Site Scripting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which character is most likely to be used for an SQL injection attack

Single quote (')

Null (\0) byte

Less than sign(<)

Greater than sign(>)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?

Reflected XSS

Persistent XSS

Insecure Direct Object Reference

Failure to Restrict URLs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers