Which of the following can be used for Cross-site scripting attacks?

Kappale 7

Quiz
•
Computers
•
University
•
Medium
Anni K
Used 8+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Session hijacking
User input is code which gets executed when the page is shown to other users.
Acquiring session ids by observing network traffic.
Search engine search term is code which gets executed when the search term is shown in the results page.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security vulnerability is exploited by setting a website on top of another with its opaque style set to value 0?
Session fixation
Clickjacking
Session hijacking
CSRF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security attack starts by sending the following HTTP request?
HTTP response splitting
CSRF
Directory traversal
None of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a typical example of CSRF (Cross-Site Request Forgery)?
User logs on to site A, then visits site B which has malicious link back to site A, which executes unwanted action.
Acquiring victim’s session id by observing network traffic.
Two websites are set on top of each other, first invisible, second visible, user clicks first the other before clicking the second.
Attacker logs on to site and acquires session id. Then they feed the id to the victim, and the attacker gains access to victim’s resources on the site.
Attacker gains control of the HTTP body by making the server print an extra CRLF sequence.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security vulnerability is described in the example: User searches using a search engine, but the search term is actually code. The code gets executed when the engine displays the search term on the results page.
CSRF
Persistent cross-site scripting
Non-persistent cross-site scripting
HTTP response splitting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CSRF tokens...
protect from cross-site request forgery attacks.
are codes shared by the server and the client to help in HTTP request validation.
are always created with the help of CSURF.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Same-origin policy...
can be used to configure CORS.
checks the protocol, the port and the host.
is synonym to CSP.
Create a free account and access millions of resources
Similar Resources on Quizizz
25 questions
PHP

Quiz
•
University
15 questions
IC3 GS6 Level 1 Domain 2 Lesson 1

Quiz
•
6th Grade - University
20 questions
ข้อสอบ Adobe Dreamweaver CS6

Quiz
•
University
20 questions
3A-DDC313-SW5

Quiz
•
University
20 questions
Domain 1 - Network Security

Quiz
•
9th Grade - University
17 questions
SEXXC ++

Quiz
•
University
15 questions
CompTIA Network+ - OSI Model

Quiz
•
University
16 questions
Computer Network Basics

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade