
Kappale 7
Quiz
•
Computers
•
University
•
Practice Problem
•
Medium
Anni K
Used 12+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following can be used for Cross-site scripting attacks?
Session hijacking
User input is code which gets executed when the page is shown to other users.
Acquiring session ids by observing network traffic.
Search engine search term is code which gets executed when the search term is shown in the results page.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security vulnerability is exploited by setting a website on top of another with its opaque style set to value 0?
Session fixation
Clickjacking
Session hijacking
CSRF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security attack starts by sending the following HTTP request?
HTTP response splitting
CSRF
Directory traversal
None of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a typical example of CSRF (Cross-Site Request Forgery)?
User logs on to site A, then visits site B which has malicious link back to site A, which executes unwanted action.
Acquiring victim’s session id by observing network traffic.
Two websites are set on top of each other, first invisible, second visible, user clicks first the other before clicking the second.
Attacker logs on to site and acquires session id. Then they feed the id to the victim, and the attacker gains access to victim’s resources on the site.
Attacker gains control of the HTTP body by making the server print an extra CRLF sequence.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security vulnerability is described in the example: User searches using a search engine, but the search term is actually code. The code gets executed when the engine displays the search term on the results page.
CSRF
Persistent cross-site scripting
Non-persistent cross-site scripting
HTTP response splitting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CSRF tokens...
protect from cross-site request forgery attacks.
are codes shared by the server and the client to help in HTTP request validation.
are always created with the help of CSURF.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Same-origin policy...
can be used to configure CORS.
checks the protocol, the port and the host.
is synonym to CSP.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Processing- The CPU Quiz
Quiz
•
10th Grade - University
15 questions
GK Quiz
Quiz
•
University
20 questions
Kuis Model Komunikasi dalam Jaringan
Quiz
•
University
20 questions
IT Essential UIUX Chapter 03 (Typography)
Quiz
•
University
20 questions
Skill Competition Quiz 2024
Quiz
•
10th Grade - University
17 questions
Grade 4 Computer Science Quiz
Quiz
•
4th Grade - University
20 questions
Spreadsheet Fundamentals - Quiz2
Quiz
•
University
15 questions
Chapter 8 - Memory Management Strategies
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
