LO1 SR

LO1 SR

University

10 Qs

quiz-placeholder

Similar activities

SOCIAL ENGINEERING

SOCIAL ENGINEERING

University

15 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Lesson 2 - Passing Data to Subsystems

Lesson 2 - Passing Data to Subsystems

University

10 Qs

LO2 SR

LO2 SR

University

6 Qs

PHP Tours Meetup #35 Atelier Pratique sécurité web : DVWA

PHP Tours Meetup #35 Atelier Pratique sécurité web : DVWA

University

10 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

University

10 Qs

W10

W10

University

10 Qs

LO1 SR

LO1 SR

Assessment

Quiz

Computers

University

Hard

Created by

Reem Ballaith

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encrypting data with SSL will not guarantee the safety of a website, because:

This only protects data between the website and user, not the Web application itself.

This approach ignores the security of the software on the network or Web server.

This only protects data transmitted through port 443.

The encryption used by SSL is not strong.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another term for DAST?

White box testing.

Black box testing.

Glass box testing.

Gray box testing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack target a website’s method of validating the identity of a user?

Authorization.

Authentication

Identity attack.

client-side attack.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which HTTP method sends data to the server?

GET

POST

PUT

SEND

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker enters the following script into the search box or an entry form: <Script>’t

Worked”</Script>. The hacker then clicks the search button and a pop-up window appears stating It Worked. What you conclude from this?

The site is susceptible to buffer overflow

The site is susceptible to SQL injection

The site is susceptible to parameter tampering

The site is susceptible to XSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In electronic authentication, which of the following controls is effective against cross-site scripting (XSS) vulnerabilities?

Sanitize inputs to make them non executable.

Insert random data into any linked uniform resource locator

Insert random data into a hidden field

Use a per-session shared secret

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CSRF stands for

Cross State Request Forgery.

Cross Site Reply Forgery.

Cross Site Request Forgery.

Cross State Reply Forgery.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?