CSRF attack

CSRF attack

KG

25 Qs

quiz-placeholder

Similar activities

Operating System

Operating System

3rd - 4th Grade

20 Qs

ICT Unit-2

ICT Unit-2

University

20 Qs

Practice Quiz QBASIC and Excel Functions

Practice Quiz QBASIC and Excel Functions

5th Grade

20 Qs

Grade 3 to Grade 5

Grade 3 to Grade 5

3rd - 5th Grade

20 Qs

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

12th Grade

20 Qs

Asesment technopreneur dkv

Asesment technopreneur dkv

10th Grade

20 Qs

python lists

python lists

10th Grade

20 Qs

4-2 final QUIZ in ELEC4

4-2 final QUIZ in ELEC4

University

20 Qs

CSRF attack

CSRF attack

Assessment

Quiz

Computers

KG

Practice Problem

Medium

Created by

vn mgm-sp

Used 36+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a type of attack that tricks site users or

administrators to unknowingly perform malicious actions for the attacker like changing order values and product prices, transfer funds from one account to another, change user passwords to hijack accounts.

SQL Injection

Cross-Site Scripting (XSS)

Command Injection

File Inclusion (LFI/RFI)

Cross-Site Request Forgery (CSRF)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For every link or form which invoke state-changing functions with an unpredictable token for each user what attack can be prevented?

OS Commanding

Cross-site Scripting

Cross-site Request Forgery

Cross-site tracing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites

SQL injection

Cross Site Scripting

Malware Uploading

Man in the Middle

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

Security Mis-configuration

Cross Site Scripting

Insecure Direct Object Reference

Broken Authentication and Session Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack that exploits the trust that a site has in a user's browser

Session Hijacking

Cross-Site Request Forgery

SQL injection

Cross-Site Scripting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which character is most likely to be used for an SQL injection attack

Single quote (')

Null (\0) byte

Less than sign(<)

Greater than sign(>)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?

Reflected XSS

Persistent XSS

Insecure Direct Object Reference

Failure to Restrict URLs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?