
Kappale 7

Quiz
•
Computers
•
University
•
Medium
Anni K
Used 8+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following can be used for Cross-site scripting attacks?
Session hijacking
User input is code which gets executed when the page is shown to other users.
Acquiring session ids by observing network traffic.
Search engine search term is code which gets executed when the search term is shown in the results page.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security vulnerability is exploited by setting a website on top of another with its opaque style set to value 0?
Session fixation
Clickjacking
Session hijacking
CSRF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security attack starts by sending the following HTTP request?
HTTP response splitting
CSRF
Directory traversal
None of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a typical example of CSRF (Cross-Site Request Forgery)?
User logs on to site A, then visits site B which has malicious link back to site A, which executes unwanted action.
Acquiring victim’s session id by observing network traffic.
Two websites are set on top of each other, first invisible, second visible, user clicks first the other before clicking the second.
Attacker logs on to site and acquires session id. Then they feed the id to the victim, and the attacker gains access to victim’s resources on the site.
Attacker gains control of the HTTP body by making the server print an extra CRLF sequence.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security vulnerability is described in the example: User searches using a search engine, but the search term is actually code. The code gets executed when the engine displays the search term on the results page.
CSRF
Persistent cross-site scripting
Non-persistent cross-site scripting
HTTP response splitting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CSRF tokens...
protect from cross-site request forgery attacks.
are codes shared by the server and the client to help in HTTP request validation.
are always created with the help of CSURF.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Same-origin policy...
can be used to configure CORS.
checks the protocol, the port and the host.
is synonym to CSP.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Chapter 4 - Social Engineering

Quiz
•
University
20 questions
Buffer Overflows - CompTIA Security+ SY0-701 - 2.3

Quiz
•
9th Grade - University
15 questions
Digital Signature Schemes

Quiz
•
University
20 questions
032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

Quiz
•
9th Grade - University
18 questions
Application/Service Attacks

Quiz
•
KG - Professional Dev...
22 questions
cyber security test

Quiz
•
University
20 questions
Domain 1 - Network Security

Quiz
•
9th Grade - University
17 questions
SEXXC ++

Quiz
•
University
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade