
Lesson 6 - Web Trojan
Authored by Babak Brad
Computers
University
Used 34+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A voting website has a form containing HTML code shown in the attached image.
What is the main reason which allows this voting website be easily attacked?
Because the form uses the GET method.
Because the code does not include an encryption algorithm.
Maybe the website is not protected by an Antivirus.
Because the radio button input can be easily modified.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following descriptions defines a Trojan Horse in the context of computer security?
A malicious computer program which appears to be a gift, but it actually is a trap.
A malicious software that when executed can replicates itself by modifying other computer programs and inserting its own code.
Any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of a digital resource.
A weakness in a computer system which can be exploited by an attacker, to perform unauthorized actions within the system.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
To protect against Web Trojans, which technique is an appropriate approach to be implemented by developers?
Escaping meta-character
Ticket system
HTML encoding
Regular expression
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Web pages with tickets in them cannot be cacheable.
True
False
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Tickets are needed only for requests that actually change something on the server.
True
False
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Using Ticket mechanism to secure a system against the Web Trojan, the system might be still vulnerable if the application is vulnerable to Cross-site Scripting.
True
False
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In a web application protected by ticket mechanism, in case of session timeout, the application should directly throw away the user's input.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Industry 4.0 Unit 1
Quiz
•
University
10 questions
Scratch
Quiz
•
KG - Professional Dev...
11 questions
HTML Postest
Quiz
•
University
9 questions
Structured/Traditional SDM
Quiz
•
University
10 questions
QUIZ GAME
Quiz
•
University
12 questions
QUIZ SAD TOPIC 1_Introduction to Information System (SAD)
Quiz
•
University
10 questions
Basha Computing 3
Quiz
•
University
10 questions
computer Networks
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
5 questions
Examining Theme
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University