Cross-Site Request Forgery

Cross-Site Request Forgery

University

11 Qs

quiz-placeholder

Similar activities

11apta

11apta

University

6 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

TCP/IP /HOSTING

TCP/IP /HOSTING

University

10 Qs

Computer Network Chapter 1 part 1

Computer Network Chapter 1 part 1

University

15 Qs

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

University

14 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

Net-215 MidTerm Review

Net-215 MidTerm Review

University

9 Qs

Cross-Site Request Forgery

Cross-Site Request Forgery

Assessment

Quiz

Computers

University

Hard

Created by

Thalita Vergilio

Used 36+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is not an alternative name for cross-site request forgery?

CSRF

Sea Surf

DDoS

Session Riding

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A CSRF attack exploits the trust...

a server has in its clients

clients have in the server

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

CSRF is mostly used to...

obtain data dumps

brute-force credentials

perform state-changing operations

gain control of the victim's machine

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In CSRF, the malicious request is typically sent from...

the victim's browser

the attacker's web server

the attacker's browser

the server itself

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is not an example of confused deputy problem?

clickjacking

FTP bounce attack

SQLi

CSRF

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

All but one can help prevent CSRF from a client's perspective.

log out of websites

use secure passwords

clear cookies

avoid clicking on suspicious links

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In a CSRF attack, the server typically sends the response to...

the attacker

a spoofed e-mail address

the victim

a proxy server

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?