Kappale 7

Kappale 7

University

20 Qs

quiz-placeholder

Similar activities

QUIZ 2

QUIZ 2

University

20 Qs

Review Quiz (Chapter 3&4)

Review Quiz (Chapter 3&4)

University

20 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

QUIZ 1: REVIEW ON C

QUIZ 1: REVIEW ON C

University

15 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

Computer Applications in Banking and Finance Quiz

Computer Applications in Banking and Finance Quiz

University

15 Qs

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

University

20 Qs

Family Quizz

Family Quizz

5th Grade - Professional Development

15 Qs

Kappale 7

Kappale 7

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Anni K

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following can be used for Cross-site scripting attacks?

Session hijacking

User input is code which gets executed when the page is shown to other users.

Acquiring session ids by observing network traffic.

Search engine search term is code which gets executed when the search term is shown in the results page.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security vulnerability is exploited by setting a website on top of another with its opaque style set to value 0?

Session fixation

Clickjacking

Session hijacking

CSRF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which security attack starts by sending the following HTTP request?

HTTP response splitting

CSRF

Directory traversal

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a typical example of CSRF (Cross-Site Request Forgery)?

User logs on to site A, then visits site B which has malicious link back to site A, which executes unwanted action.

Acquiring victim’s session id by observing network traffic.

Two websites are set on top of each other, first invisible, second visible, user clicks first the other before clicking the second.

Attacker logs on to site and acquires session id. Then they feed the id to the victim, and the attacker gains access to victim’s resources on the site.

Attacker gains control of the HTTP body by making the server print an extra CRLF sequence.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security vulnerability is described in the example: User searches using a search engine, but the search term is actually code. The code gets executed when the engine displays the search term on the results page.

CSRF

Persistent cross-site scripting

Non-persistent cross-site scripting

HTTP response splitting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CSRF tokens...

protect from cross-site request forgery attacks.

are codes shared by the server and the client to help in HTTP request validation.

are always created with the help of CSURF.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Same-origin policy...

can be used to configure CORS.

checks the protocol, the port and the host.

is synonym to CSP.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?