
Cross-Site Request Forgery
Authored by Thalita Vergilio
Computers
University
Used 36+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which is not an alternative name for cross-site request forgery?
CSRF
Sea Surf
DDoS
Session Riding
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A CSRF attack exploits the trust...
a server has in its clients
clients have in the server
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
CSRF is mostly used to...
obtain data dumps
brute-force credentials
perform state-changing operations
gain control of the victim's machine
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In CSRF, the malicious request is typically sent from...
the victim's browser
the attacker's web server
the attacker's browser
the server itself
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which is not an example of confused deputy problem?
clickjacking
FTP bounce attack
SQLi
CSRF
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
All but one can help prevent CSRF from a client's perspective.
log out of websites
use secure passwords
clear cookies
avoid clicking on suspicious links
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In a CSRF attack, the server typically sends the response to...
the attacker
a spoofed e-mail address
the victim
a proxy server
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?