Lesson 5 - Output Handling

Lesson 5 - Output Handling

University

10 Qs

quiz-placeholder

Similar activities

Lesson 2 - Passing Data to Subsystems

Lesson 2 - Passing Data to Subsystems

University

10 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

สื่อมัลติมีเดียเพื่อการศึกษา

สื่อมัลติมีเดียเพื่อการศึกษา

University

10 Qs

Google Cloudyy Quiz

Google Cloudyy Quiz

University

13 Qs

Quiz Pit-Stop 3 (Security and the Internet)

Quiz Pit-Stop 3 (Security and the Internet)

University

10 Qs

2204-2009 การสร้างเว็บไซต์

2204-2009 การสร้างเว็บไซต์

University

10 Qs

computer Networks

computer Networks

University

10 Qs

INTERNET

INTERNET

1st Grade - University

15 Qs

Lesson 5 - Output Handling

Lesson 5 - Output Handling

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Babak Brad

Used 49+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

Which of the following statements is incorrect in XSS attack?

A

B

C

D

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Cross-site Scripting may be used to hijack cookie-based sessions.

True

False

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

What is the first step in simplest possible session hijacking using Cross-site Scripting?

A

B

C

D

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

What is the main task of injected script by attacker in XSS-based session hijacking?

A

B

C

D

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In a XSS session hijacking, the attacker connects directly to the web site, he can get victim's unique cookie, _______________.

only if the victim is logged in

only if the victim is logged out

and does not matter victim is logged in or not

but he has no full access at the same level of victim

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Attacker used a script to change data displayed to bank clerk for manual inspection. This can be successful because of __________________.

vulnerability in the bank database

inappropriate output handling in web application

not escaping shell meta-characters

careless manual inspection by clerk

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In general, Cross-site Scripting is a _______________.

network layer problem

input validation problem

shell problem

metacharacter problem

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?