
2.3.1 - Securing e-Commerce Data INTRO
Authored by Andrew Schmitz
Computers
9th - 12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
Use the Internet to explain - in your own words - what Cross-Site Scripting (JavaScript) is and how it applies to securing data on a e-commerce site hosted on your server.
Evaluate responses using AI:
OFF
2.
OPEN ENDED QUESTION
3 mins • 1 pt
Use the Internet to explain - in your own words - what SQL Injection is and how it applies to securing data on a e-commerce site hosted on your server.
Evaluate responses using AI:
OFF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Understand - that in this lesson we will witness the use of Cross-Site scripting and SQL interjections to disrupt and manipulate a (fake) bank website. Please state that you understand that witnessing this is in a sense teaching you strategies to doing it.
These actions are WRONG and extremely illegal.
It is our ethical responsibility as Cyber Analysts/Experts to understand these attacks so we can education our users against these attacks and to secure and protect our servers and hosted data against such attacks.
Yes, I understand that I am learning these skills for prevention and protection purposes.
No, I do not understand why I am learning about these illegal activities and my morals are not strong enough to do the right thing.
(Click this answer and be docked points 😘)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you think? Can websites only be exploited on the server level?
True:
Really, I posted all those examples in the False and you still chose True...
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of web exploitation involves injecting malicious scripts into web pages that are then executed by a user's browser?
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
SQL Injection
Man-in-the-Middle (MitM) Attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which web exploitation occurs when attackers manipulate input fields to execute unauthorized commands or access sensitive data on the server side?
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
SQL Injection
DNS Spoofing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of web exploitation involves vulnerabilities in web servers or applications, such as exploiting outdated software or misconfigurations?
SQL Injection
Browser Exploits
Server-side Exploits
Man-in-the-Middle (MitM) Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Recursos y Herramientas de la Administración de base de dato
Quiz
•
11th Grade
10 questions
K11 - Bài 17
Quiz
•
11th Grade
9 questions
IT related jobs
Quiz
•
9th Grade
10 questions
Trắc nghiệm bài 12 tin học 11
Quiz
•
11th Grade
10 questions
EMPOWERMENT TECHNOLOGIES – QUIZ 7 [New]
Quiz
•
11th Grade
12 questions
OCR Internet Technologies
Quiz
•
10th - 11th Grade
10 questions
Glastonbr.ICT Definitions
Quiz
•
9th Grade
12 questions
Bài 12. Hệ QTCSDL và hệ CSDL
Quiz
•
11th Grade
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade