Search Header Logo

User Input Threats

Authored by Mousumi Biswas

Mathematics

9th Grade

CCSS covered

Used 1+ times

User Input Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of User Input? Fill in the blank: User Input is numbers, characters, a text string, or ________ that is provided by the user to a website.

script code

background image

server address

browser history

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of user input?

When a user fills in a form

When a user logs in

When a user adds a comment to a forum

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of attack that can occur when a website accepts user input?

A) Directory Traversal

B) Buffer Overflow

C) Command Injection

D) Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ is an attack where an attacker tries to access directories and files stored outside the web root folder.

Directory Traversal

SQL Injection

Cross-Site Scripting

Session Fixation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ is an attack that occurs when more data is written to a buffer than it can hold.

Buffer Overflow

SQL Injection

Cross-Site Scripting

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ is an attack where malicious code is inserted into a website to be executed by other users (often abbreviated as XSS).

Cross-Site Scripting

SQL Injection

Phishing

Denial of Service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Based on the passage: Why is security often not considered a priority during the coding process?

Most programmers are focused on making their application work and meeting their deadlines to publish the code.

Security is always the main focus during coding.

Programmers believe security is handled automatically by the computer.

Security is only important after the application is released.

Tags

CCSS.RI. 9-10.2

CCSS.RI.8.2

CCSS.RL.7.2

CCSS.RL.8.2

CCSS.RL.9-10.2

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?