2.3.1 - Securing e-Commerce Data INTRO

2.3.1 - Securing e-Commerce Data INTRO

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

social engineering attacks 2

social engineering attacks 2

12th Grade

10 Qs

CMS Web Servers

CMS Web Servers

12th Grade

8 Qs

Basis Data 1

Basis Data 1

11th Grade

12 Qs

POST TEST BASIS DATA KELAS 11

POST TEST BASIS DATA KELAS 11

11th Grade

10 Qs

SQL

SQL

10th - 12th Grade

11 Qs

LearnKey D3L1

LearnKey D3L1

9th - 12th Grade

6 Qs

Level 3

Level 3

10th Grade

10 Qs

Introducción a BackEnd

Introducción a BackEnd

11th Grade

10 Qs

2.3.1 - Securing e-Commerce Data INTRO

2.3.1 - Securing e-Commerce Data INTRO

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Andrew Schmitz

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Use the Internet to explain - in your own words - what Cross-Site Scripting (JavaScript) is and how it applies to securing data on a e-commerce site hosted on your server.

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Use the Internet to explain - in your own words - what SQL Injection is and how it applies to securing data on a e-commerce site hosted on your server.

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Understand - that in this lesson we will witness the use of Cross-Site scripting and SQL interjections to disrupt and manipulate a (fake) bank website. Please state that you understand that witnessing this is in a sense teaching you strategies to doing it.

These actions are WRONG and extremely illegal.

It is our ethical responsibility as Cyber Analysts/Experts to understand these attacks so we can education our users against these attacks and to secure and protect our servers and hosted data against such attacks.

Yes, I understand that I am learning these skills for prevention and protection purposes.

No, I do not understand why I am learning about these illegal activities and my morals are not strong enough to do the right thing.

(Click this answer and be docked points 😘)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you think? Can websites only be exploited on the server level?

Media Image

True:

Really, I posted all those examples in the False and you still chose True...

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of web exploitation involves injecting malicious scripts into web pages that are then executed by a user's browser?

Cross-Site Request Forgery (CSRF)

Cross-Site Scripting (XSS)

SQL Injection

Man-in-the-Middle (MitM) Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which web exploitation occurs when attackers manipulate input fields to execute unauthorized commands or access sensitive data on the server side?

Cross-Site Scripting (XSS)

Cross-Site Request Forgery (CSRF)

SQL Injection

DNS Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of web exploitation involves vulnerabilities in web servers or applications, such as exploiting outdated software or misconfigurations?

SQL Injection

Browser Exploits

Server-side Exploits

Man-in-the-Middle (MitM) Attack

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which web exploitation involves tricking users into providing sensitive information, such as login credentials, by exploiting human behavior?

Cross-Site Scripting (XSS)

Phishing Attacks

DNS Spoofing

Injection Attacks