Kappale 7

Kappale 7

University

20 Qs

quiz-placeholder

Similar activities

WNS Revision

WNS Revision

University

20 Qs

Examen 3erParcial DAND

Examen 3erParcial DAND

University

20 Qs

QUIZ BASIC NETWORK

QUIZ BASIC NETWORK

University

15 Qs

WEEK 9–10: CodeIgniter Security Practices

WEEK 9–10: CodeIgniter Security Practices

University

15 Qs

CompTIA Network+ - OSI Model

CompTIA Network+ - OSI Model

University

15 Qs

3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

cyber security test

cyber security test

University

22 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

Kappale 7

Kappale 7

Assessment

Quiz

Computers

University

Medium

Created by

Anni K

Used 8+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following can be used for Cross-site scripting attacks?

Session hijacking

User input is code which gets executed when the page is shown to other users.

Acquiring session ids by observing network traffic.

Search engine search term is code which gets executed when the search term is shown in the results page.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security vulnerability is exploited by setting a website on top of another with its opaque style set to value 0?

Session fixation

Clickjacking

Session hijacking

CSRF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which security attack starts by sending the following HTTP request?

HTTP response splitting

CSRF

Directory traversal

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a typical example of CSRF (Cross-Site Request Forgery)?

User logs on to site A, then visits site B which has malicious link back to site A, which executes unwanted action.

Acquiring victim’s session id by observing network traffic.

Two websites are set on top of each other, first invisible, second visible, user clicks first the other before clicking the second.

Attacker logs on to site and acquires session id. Then they feed the id to the victim, and the attacker gains access to victim’s resources on the site.

Attacker gains control of the HTTP body by making the server print an extra CRLF sequence.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security vulnerability is described in the example: User searches using a search engine, but the search term is actually code. The code gets executed when the engine displays the search term on the results page.

CSRF

Persistent cross-site scripting

Non-persistent cross-site scripting

HTTP response splitting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CSRF tokens...

protect from cross-site request forgery attacks.

are codes shared by the server and the client to help in HTTP request validation.

are always created with the help of CSURF.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Same-origin policy...

can be used to configure CORS.

checks the protocol, the port and the host.

is synonym to CSP.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?