
Assets and Threats: Quiz 9

Quiz
•
Computers
•
Professional Development
•
Hard
John Coder
FREE Resource
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Web-based exploits are malicious code or behavior that's used to take advantage of co_______ flaws in a w________ application. Cybercriminals target w________-based exploits to obtain sensitive personal information. Attacks occur because w________ applications interact with multiple users across multiple networks. Malicious hackers commonly exploit this high level of interaction using inj__________ attacks.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
An injection attack is malicious code inserted into a vulnerable application. The infected application often appears to work normally. That's because the injected code runs in the back_________, unknown to the user. Applications are vulnerable to injection attacks because they are programmed to receive data inputs. This could be something the user types, clicks, or something one program is sharing with another. When coded correctly, applications should be able to interpret and handle user inputs.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A common and dangerous type of injection attack that's a threat to web apps is cross-site scri___________. XSS, is an injection attack that inserts code into a vulnerable website or web application. These attacks are often delivered by exploiting the two languages used by most websites, ? and JavaScript. Both can give cybercriminals access to everything that loads on the infected web page. This can include session cookies, geolocation, and even webcams and microphones.
There are three main types of cross-site scripting attacks reflected, stored, and DOM-based.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A reflected XSS attack is an instance where a malicious script is sent to the server and activated during the server's res_____________. A common example of this is the search bar of a website. In a reflected XSS attack, criminals send their target a web link that appears to go to a trusted site. When they click the link, it sends a HTTP request to the vulnerable site server. The attacker script is then returned or reflected back to the innocent user's browser. Here, the browser loads the malicious script because it trusts the server's response. With the script loaded, information like session co_________ are sent back to the attacker.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
In a stored XSS attack, the malicious script isn't hidden in a link that needs to be sent to the server. Instead a stored XSS attack is an instance when malicious script is injected directly on the server. Here, attackers target ele____________ of a site that are served to the user. This could be things like images and buttons that load when the site is visited. Infected elements activate the malicious code when a user simply visits the site. Stored XSS attacks can be damaging because the user has no way of knowing the site is infected beforehand.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
In a DOM-based attack, a malicious script can be seen in the URL. In this example, the website's URL contains parameter values. The parameter values reflect input from the user. Here, the site allows users to select color themes. When the user makes a selection, it appears as part of the URL. In a DOM-based attack, criminals change the para____________ that suspecting an input. For example, they could hide malicious JavaScript in the HTML tags. The browser would process the HTML and execute the JavaScript.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The best way to defend against SQL injection is code that will sa_________ the input. Developers can write code to search for specific SQL characters. This gives the server a clearer idea of what inputs to expect. One way this is done is with pre__________ statements.
A pre__________ statement is a coding technique that executes SQL statements before passing them on to the database. When the user's input is unknown, the best practice is to use these pre__________ statements. With just a few extra lines of code, a pre__________ statement executes the code before passing it on to the server. This means the code can be validated before performing the query.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
20 questions
Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz
•
Professional Development
17 questions
Cyber Quiz

Quiz
•
Professional Development
11 questions
Week 2

Quiz
•
Professional Development
17 questions
Phishing 1

Quiz
•
Professional Development
15 questions
SEC+ Ch.6 Review Test

Quiz
•
Professional Development
15 questions
Sec Practice Quiz

Quiz
•
Professional Development
20 questions
Web Application Security Testing-PreTest

Quiz
•
Professional Development
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
14 questions
Disney Trivia

Quiz
•
Professional Development
14 questions
2019 Logos

Quiz
•
Professional Development
7 questions
How to Email your Teacher

Quiz
•
Professional Development
11 questions
NFL Football logos

Quiz
•
KG - Professional Dev...
20 questions
Employability Skills

Quiz
•
Professional Development