WNS Revision

WNS Revision

University

20 Qs

quiz-placeholder

Similar activities

QUIZ 2

QUIZ 2

University

20 Qs

Fun with Computer Architecture

Fun with Computer Architecture

University

15 Qs

Review Quiz (Chapter 3&4)

Review Quiz (Chapter 3&4)

University

20 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

QUIZ 1: REVIEW ON C

QUIZ 1: REVIEW ON C

University

15 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

University

20 Qs

Family Quizz

Family Quizz

5th Grade - Professional Development

15 Qs

WNS Revision

WNS Revision

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Thalita Vergilio

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What does CVE stand for?

Common Viabilities and Exposures

Common Vulnerabilities and Exposures

Common Vulnerabilities and Exploits

Common Viabilities and Exploits

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

An attacker impersonates an employee from the IT department and asks a user for her password. He is attempting...

IP spoofing

man-in-the-middle attack

social engineering

LDAP injection

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A spider is used to...

download copies of websites and their contents

intercept traffic between the browser and websites

steal session cookies from other logged-in users

automate XSS attacks against websites

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is most likely to occur when the difference between code and data is not clear?

insecure direct object reference

security misconfiguration

broken authentication and session management

injection

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

The self-retweeting tweet attack shown is a type of...

stored XSS

reflected XSS

DOM-based XSS

IDOR

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is likely to happen when a server takes user inputted data and sends it to a browser without proper validation?

security misconfiguration

cross-site scripting

insecure direct object reference

broken authentication and session management

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which type of XSS attack executes in the browsers of every visitor of a page?

stored

reflected

DOM-based

man-in-the-middle

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?