Search Header Logo

9.2.2 User Input Security

Authored by Christine Rehwinkel

Computers

12th Grade

Used 3+ times

9.2.2 User Input Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of user input?

When a user fills in a form.

When a user views a webpage.

When a user downloads a file.

When a user reads an email.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can occur when a website accepts user input?

Directory Traversal

Phishing

Man-in-the-Middle

Denial of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of attack that can occur from user input?

Buffer Overflow

Command Injection

Cross-Site Scripting (XSS)

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cross-Site Scripting (XSS)?

An attack where malicious scripts are injected into trusted websites.

An attack that disrupts the service of a network.

An attack that intercepts communication between two parties.

An attack that encrypts data and demands ransom.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a Directory Traversal attack?

To delete files in the root folder

To access files outside the permitted system space

To encrypt files in the system

To create new files in the root folder

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tactic is used in a Directory Traversal attack?

Inserting a series of ../ characters into the URL or software code

Deleting system files

Encrypting the root folder

Creating new user accounts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a buffer overflow?

A situation where the data is smaller than the input variable can hold.

A situation where the data is larger than the input variable can hold and overflows into process execution space to run hostile code.

A situation where the data is exactly the size of the input variable.

A situation where the data is stored in the CPU.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?