Lesson 2 - Passing Data to Subsystems

Lesson 2 - Passing Data to Subsystems

University

10 Qs

quiz-placeholder

Similar activities

Micro:bit

Micro:bit

4th Grade - University

12 Qs

Java Programming-1

Java Programming-1

University

10 Qs

Session 2 - Hardware and Peripherals

Session 2 - Hardware and Peripherals

10th Grade - University

12 Qs

Indesign

Indesign

University

12 Qs

Архітектура ПЗ

Архітектура ПЗ

University

11 Qs

LINUX MODULE 03 QUIZ

LINUX MODULE 03 QUIZ

University

10 Qs

SOAL : Pengenalan Basis Data

SOAL : Pengenalan Basis Data

University

10 Qs

KUIZ K1

KUIZ K1

University

10 Qs

Lesson 2 - Passing Data to Subsystems

Lesson 2 - Passing Data to Subsystems

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Babak Brad

Used 58+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the main security problem with meta-characters, when a dynamic web applications pass data to a subsystem?

The parser may switch context from normal text to control command.

They may contain names, addresses, passwords, and some private information.

They contain raw data, instead of encrypted data.

The programmer is not able to handle them.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Any database server based on SQL will need to have quotes escaped in string constants.

True

False

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The hyphens are not the main root of problem in SQL injection attack.

True

False

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

If a program run an external command using operating system, the risk of which attack is more probably increased?

SQL injection

Shell command injection

Session Hijacking

All the above answers

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

All the following methods are useful to reduce the risk of Shell Command Injection, except:

Managing without the shell

Avoiding user input in the command arguments

Avoiding 'Finger' and 'Sendmail' commands

Handling shell metacharacters

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

An attacker entered this input as email address when registering in a system. What attack he intend to perform?

Shell command injection

SQL injection

Session hijacking

Metacharacter injection

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An attacker can modify queries that are sent to a database by playing with input to the web application. It describes ...

Shell Command Injection

SQL Injection

Cross-site Scripting

Session Hijacking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?