Search Header Logo

2.3.1 - Securing e-Commerce Data INTRO

Authored by Andrew Schmitz

Computers

9th - 12th Grade

Used 6+ times

2.3.1 - Securing e-Commerce Data INTRO
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Use the Internet to explain - in your own words - what Cross-Site Scripting (JavaScript) is and how it applies to securing data on a e-commerce site hosted on your server.

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Use the Internet to explain - in your own words - what SQL Injection is and how it applies to securing data on a e-commerce site hosted on your server.

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Understand - that in this lesson we will witness the use of Cross-Site scripting and SQL interjections to disrupt and manipulate a (fake) bank website. Please state that you understand that witnessing this is in a sense teaching you strategies to doing it.

These actions are WRONG and extremely illegal.

It is our ethical responsibility as Cyber Analysts/Experts to understand these attacks so we can education our users against these attacks and to secure and protect our servers and hosted data against such attacks.

Yes, I understand that I am learning these skills for prevention and protection purposes.

No, I do not understand why I am learning about these illegal activities and my morals are not strong enough to do the right thing.

(Click this answer and be docked points 😘)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you think? Can websites only be exploited on the server level?

Media Image

True:

Really, I posted all those examples in the False and you still chose True...

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of web exploitation involves injecting malicious scripts into web pages that are then executed by a user's browser?

Cross-Site Request Forgery (CSRF)

Cross-Site Scripting (XSS)

SQL Injection

Man-in-the-Middle (MitM) Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which web exploitation occurs when attackers manipulate input fields to execute unauthorized commands or access sensitive data on the server side?

Cross-Site Scripting (XSS)

Cross-Site Request Forgery (CSRF)

SQL Injection

DNS Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of web exploitation involves vulnerabilities in web servers or applications, such as exploiting outdated software or misconfigurations?

SQL Injection

Browser Exploits

Server-side Exploits

Man-in-the-Middle (MitM) Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?