Web based attacks 2025

Web based attacks 2025

University

20 Qs

quiz-placeholder

Similar activities

Chapter 8 - Memory Management Strategies

Chapter 8 - Memory Management Strategies

University

15 Qs

31-10-2024 gab 4 audit it uncp

31-10-2024 gab 4 audit it uncp

University

20 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

Malware Quiz

Malware Quiz

KG - University

15 Qs

Basic of Cloud Computing

Basic of Cloud Computing

University

15 Qs

Cloud Deployment

Cloud Deployment

University

20 Qs

Membangun Program Security Awareness

Membangun Program Security Awareness

University - Professional Development

20 Qs

ROUND 1

ROUND 1

University

20 Qs

Web based attacks 2025

Web based attacks 2025

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Joseph Raymond V

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...vulnerabilities refer to the security risks that the organization identifies and documents.

OWASP

NIST

GCCP

OSNT

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...refers to the inadequate protection of sensitive data, both in transit and at rest.

Protection Failures

Network Failures

Transit Failures

Cryptographic Failures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a broad category of vulnerabilities where an attacker can send malicious data to an application, causing it to execute unintended commands.

Backdoor

Information Stealer

Injection

Botnet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... vulnerability allows an attacker to coerce the server-side application into making requests to an unintended location, potentially exposing internal services or data.

External-Side Request Forgery

Server-Side Request Forgery

Client-Side Request Forgery

Internal-Side Request Forgery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a common and dangerous web security vulnerability that allows an attacker to inject malicious client-side scripts into web pages viewed by other users.

XSS

CSS

MSS

VSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... allows the attacker to embed executable code that the browser will interpret as part of the legitimate page.

Data input

User Input

Code Input

Page input

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker to embed executable code that the browser will interpret as part of the legitimate page called as..

clone

steal

deface

harvest

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?