VAPT

VAPT

University

50 Qs

quiz-placeholder

Similar activities

UAS TIK KELAS VII GANJIL 2024/2025

UAS TIK KELAS VII GANJIL 2024/2025

7th Grade - University

50 Qs

UTS Perangkat Komputer

UTS Perangkat Komputer

7th Grade - University

50 Qs

ETHICS IN COMPUTING QUIZ

ETHICS IN COMPUTING QUIZ

University

50 Qs

Challenge Fullstack : Évaluez Vos Fondamentaux

Challenge Fullstack : Évaluez Vos Fondamentaux

2nd Grade - University

55 Qs

 COMPUTER SYSYTEMS SERVICING

COMPUTER SYSYTEMS SERVICING

10th Grade - University

55 Qs

Кәсіби ағылшын 201 - 250

Кәсіби ағылшын 201 - 250

University

50 Qs

Beginner's Guide to Pseudocode Structure

Beginner's Guide to Pseudocode Structure

8th Grade - University

50 Qs

UAS - Struktur Data

UAS - Struktur Data

University

50 Qs

VAPT

VAPT

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

chris levics

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Which of the following best describes a client-side vulnerability?

Flaw in server configuration

Weakness in user-side applications like browsers or plugins

Misconfigured firewall rules

Database injection flaw

2.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Cross-Site Scripting (XSS) is primarily a type of:

Server-side vulnerability

Client-side vulnerability

Network-level vulnerability

Authentication issue

3.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Which client-side technology is most often targeted for injection attacks?

HTML

CSS

JavaScript

XML

4.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Drive-by download attacks occur when:

A user downloads a file intentionally

Malware is automatically downloaded when visiting a webpage

A firewall is disabled by the user

A web server hosts malicious files

5.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Which of the following is a major cause of client-side vulnerabilities?

Outdated software and plugins

Strong encryption algorithms

Sandboxing browsers

Code signing verification

6.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

What is the main role of a browser sandbox?

To improve page rendering

To isolate browser processes and reduce exploit impact

To store cookies securely

To manage browser extensions

7.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Which of the following can exploit client-side vulnerabilities?

Email attachments

Malicious web pages

Infected USB drives

All of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?