
2.3.1 - Securing e-Commerce Data INTRO
Authored by Andrew Schmitz
Computers
9th - 12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
Use the Internet to explain - in your own words - what Cross-Site Scripting (JavaScript) is and how it applies to securing data on a e-commerce site hosted on your server.
Evaluate responses using AI:
OFF
2.
OPEN ENDED QUESTION
3 mins • 1 pt
Use the Internet to explain - in your own words - what SQL Injection is and how it applies to securing data on a e-commerce site hosted on your server.
Evaluate responses using AI:
OFF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Understand - that in this lesson we will witness the use of Cross-Site scripting and SQL interjections to disrupt and manipulate a (fake) bank website. Please state that you understand that witnessing this is in a sense teaching you strategies to doing it.
These actions are WRONG and extremely illegal.
It is our ethical responsibility as Cyber Analysts/Experts to understand these attacks so we can education our users against these attacks and to secure and protect our servers and hosted data against such attacks.
Yes, I understand that I am learning these skills for prevention and protection purposes.
No, I do not understand why I am learning about these illegal activities and my morals are not strong enough to do the right thing.
(Click this answer and be docked points 😘)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you think? Can websites only be exploited on the server level?
True:
Really, I posted all those examples in the False and you still chose True...
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of web exploitation involves injecting malicious scripts into web pages that are then executed by a user's browser?
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
SQL Injection
Man-in-the-Middle (MitM) Attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which web exploitation occurs when attackers manipulate input fields to execute unauthorized commands or access sensitive data on the server side?
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
SQL Injection
DNS Spoofing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of web exploitation involves vulnerabilities in web servers or applications, such as exploiting outdated software or misconfigurations?
SQL Injection
Browser Exploits
Server-side Exploits
Man-in-the-Middle (MitM) Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Keamanan Jaringan
Quiz
•
11th Grade
10 questions
Diagnóstico - DISEÑO WEB 1
Quiz
•
8th - 12th Grade
10 questions
HTML & Google Site Seatwork
Quiz
•
12th Grade
10 questions
Learn When to Trust a Website and When to Avoid It
Quiz
•
KG - University
11 questions
Unilayer Network Quiz Week 2
Quiz
•
12th Grade
10 questions
Questionário formativo - SI - Mód 2
Quiz
•
10th - 12th Grade
12 questions
Unit 11: Risk Assessments
Quiz
•
12th Grade
10 questions
XI TKJ Latihan SAS Genap
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade