Cross-Site Request Forgery

Cross-Site Request Forgery

University

11 Qs

quiz-placeholder

Similar activities

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Computer Architecture Unit 3

Computer Architecture Unit 3

University

15 Qs

BCA

BCA

University

10 Qs

Assessment 08

Assessment 08

University

15 Qs

Information Technology & Business Canvas Model

Information Technology & Business Canvas Model

University

13 Qs

Quiz on neural network unit II

Quiz on neural network unit II

University

16 Qs

GIS Unit-1

GIS Unit-1

University

15 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Cross-Site Request Forgery

Cross-Site Request Forgery

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Thalita Vergilio

Used 36+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is not an alternative name for cross-site request forgery?

CSRF

Sea Surf

DDoS

Session Riding

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A CSRF attack exploits the trust...

a server has in its clients

clients have in the server

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

CSRF is mostly used to...

obtain data dumps

brute-force credentials

perform state-changing operations

gain control of the victim's machine

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In CSRF, the malicious request is typically sent from...

the victim's browser

the attacker's web server

the attacker's browser

the server itself

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is not an example of confused deputy problem?

clickjacking

FTP bounce attack

SQLi

CSRF

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

All but one can help prevent CSRF from a client's perspective.

log out of websites

use secure passwords

clear cookies

avoid clicking on suspicious links

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In a CSRF attack, the server typically sends the response to...

the attacker

a spoofed e-mail address

the victim

a proxy server

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?