Web based attacks 2025

Web based attacks 2025

University

20 Qs

quiz-placeholder

Similar activities

email protocols

email protocols

University

20 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Cloud Computing 04

Cloud Computing 04

University

20 Qs

Fellowship program 2021

Fellowship program 2021

University - Professional Development

15 Qs

Telecommunications

Telecommunications

University

20 Qs

Introduction to Blockchain, Web3 and Metaverse

Introduction to Blockchain, Web3 and Metaverse

University

15 Qs

Software and Operating Systems Quiz

Software and Operating Systems Quiz

University

20 Qs

Guess That Games

Guess That Games

4th Grade - University

16 Qs

Web based attacks 2025

Web based attacks 2025

Assessment

Quiz

Computers

University

Medium

Created by

Joseph Raymond V

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...vulnerabilities refer to the security risks that the organization identifies and documents.

OWASP

NIST

GCCP

OSNT

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...refers to the inadequate protection of sensitive data, both in transit and at rest.

Protection Failures

Network Failures

Transit Failures

Cryptographic Failures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a broad category of vulnerabilities where an attacker can send malicious data to an application, causing it to execute unintended commands.

Backdoor

Information Stealer

Injection

Botnet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... vulnerability allows an attacker to coerce the server-side application into making requests to an unintended location, potentially exposing internal services or data.

External-Side Request Forgery

Server-Side Request Forgery

Client-Side Request Forgery

Internal-Side Request Forgery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a common and dangerous web security vulnerability that allows an attacker to inject malicious client-side scripts into web pages viewed by other users.

XSS

CSS

MSS

VSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... allows the attacker to embed executable code that the browser will interpret as part of the legitimate page.

Data input

User Input

Code Input

Page input

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker to embed executable code that the browser will interpret as part of the legitimate page called as..

clone

steal

deface

harvest

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?