
Backend Development - Quiz #1
Authored by Owen Jasper Vargas
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is Cross-site request forgery (CSRF)?
A type of malware that infects user devices.
Cross-site request forgery (CSRF) is a security vulnerability that allows attackers to perform actions on behalf of authenticated users without their consent.
A method to encrypt user data during transmission.
A technique to improve website loading speed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Explain the concept of tokenization in back-end development.
Tokenization is the process of converting sensitive data into unique tokens for enhanced security in back-end development.
Tokenization is the process of encrypting data for secure transmission.
Tokenization involves creating backups of sensitive data for recovery purposes.
Tokenization is the method of compressing data to save storage space.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the difference between Authentication and Authorization?
Authentication verifies identity; Authorization determines access rights.
Authentication is the same as Authorization.
Authentication is only for system administrators.
Authorization is about verifying identity.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is SSRF and how does an attack work?
SSRF is a type of attack that tricks a server into making requests to unintended locations.
SSRF is a technique for optimizing server performance.
SSRF allows users to access local files on the server.
SSRF is a method for securing server requests.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
How can HTML be misused in web security contexts?
HTML cannot be used to manipulate user sessions.
HTML can be used to enhance website performance.
HTML is primarily used for server-side scripting.
HTML can be misused for Cross-Site Scripting (XSS) and exposing sensitive data through insecure forms.
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What are the common methods to prevent Cross-Site Scripting (XSS) attacks?
Disabling JavaScript on the client side is the best way to prevent XSS attacks.
Cross-Origin Resource Sharing (CORS) is the primary method to prevent XSS attacks.
Input validation and output encoding are effective methods to prevent XSS attacks.
Using only HTTP headers is sufficient to prevent XSS attacks.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the purpose of a Web Application Firewall (WAF)?
A WAF is a tool for encrypting data in transit.
A WAF is primarily for managing user sessions.
A WAF is used to enhance the performance of web applications.
A WAF is designed to monitor and filter HTTP traffic to and from a web application.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
9 questions
Structured/Traditional SDM
Quiz
•
University
11 questions
Youtube
Quiz
•
4th Grade - University
10 questions
computer Networks
Quiz
•
University
15 questions
PICMAKER
Quiz
•
University
15 questions
Vistacreate
Quiz
•
University
10 questions
Industry 4.0 Unit 1
Quiz
•
University
10 questions
Scratch
Quiz
•
KG - Professional Dev...
16 questions
E-Commerce
Quiz
•
University - Professi...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade