CSRF attack

CSRF attack

KG

•

25 Qs

quiz-placeholder

Similar activities

Django-quiz

Django-quiz

5th Grade - University

•

20 Qs

QUIZ 3 SAM

QUIZ 3 SAM

12th Grade

•

20 Qs

DreamWeaver CS6

DreamWeaver CS6

University

•

20 Qs

empowerment quiz2

empowerment quiz2

1st - 5th Grade

•

20 Qs

Arduino_Quiz

Arduino_Quiz

12th Grade

•

20 Qs

Quiz Informatika Bab 3 & 4

Quiz Informatika Bab 3 & 4

10th Grade

•

20 Qs

ICT Grade 8 Model exam Altaluq private school Excel

ICT Grade 8 Model exam Altaluq private school Excel

8th Grade

•

20 Qs

Multimedia Video & Animation

Multimedia Video & Animation

University

•

20 Qs

CSRF attack

CSRF attack

Assessment

Quiz

•

Computers

•

KG

•

Practice Problem

•

Medium

Created by

vn mgm-sp

Used 36+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a type of attack that tricks site users or

administrators to unknowingly perform malicious actions for the attacker like changing order values and product prices, transfer funds from one account to another, change user passwords to hijack accounts.

SQL Injection

Cross-Site Scripting (XSS)

Command Injection

File Inclusion (LFI/RFI)

Cross-Site Request Forgery (CSRF)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For every link or form which invoke state-changing functions with an unpredictable token for each user what attack can be prevented?

OS Commanding

Cross-site Scripting

Cross-site Request Forgery

Cross-site tracing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites

SQL injection

Cross Site Scripting

Malware Uploading

Man in the Middle

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?

Security Mis-configuration

Cross Site Scripting

Insecure Direct Object Reference

Broken Authentication and Session Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack that exploits the trust that a site has in a user's browser

Session Hijacking

Cross-Site Request Forgery

SQL injection

Cross-Site Scripting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which character is most likely to be used for an SQL injection attack

Single quote (')

Null (\0) byte

Less than sign(<)

Greater than sign(>)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?

Reflected XSS

Persistent XSS

Insecure Direct Object Reference

Failure to Restrict URLs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?