
VAPT
Authored by chris levics
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
Which of the following best describes a client-side vulnerability?
Flaw in server configuration
Weakness in user-side applications like browsers or plugins
Misconfigured firewall rules
Database injection flaw
2.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
Cross-Site Scripting (XSS) is primarily a type of:
Server-side vulnerability
Client-side vulnerability
Network-level vulnerability
Authentication issue
3.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
Which client-side technology is most often targeted for injection attacks?
HTML
CSS
JavaScript
XML
4.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
Drive-by download attacks occur when:
A user downloads a file intentionally
Malware is automatically downloaded when visiting a webpage
A firewall is disabled by the user
A web server hosts malicious files
5.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
Which of the following is a major cause of client-side vulnerabilities?
Outdated software and plugins
Strong encryption algorithms
Sandboxing browsers
Code signing verification
6.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
What is the main role of a browser sandbox?
To improve page rendering
To isolate browser processes and reduce exploit impact
To store cookies securely
To manage browser extensions
7.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
Which of the following can exploit client-side vulnerabilities?
Email attachments
Malicious web pages
Infected USB drives
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?