9.2.2 User Input Security

9.2.2 User Input Security

12th Grade

22 Qs

quiz-placeholder

Similar activities

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

10th - 12th Grade

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Informatika Kelas 5 Bab 2

Informatika Kelas 5 Bab 2

5th Grade - University

19 Qs

Trắc nghiệm excel - 1

Trắc nghiệm excel - 1

KG - University

20 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

ASPEK LEGAL TIK XII

ASPEK LEGAL TIK XII

12th Grade

20 Qs

Pengayaan Informatika

Pengayaan Informatika

12th Grade

20 Qs

9.2.2 User Input Security

9.2.2 User Input Security

Assessment

Passage

Computers

12th Grade

Practice Problem

Easy

Created by

Christine Rehwinkel

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of user input?

When a user fills in a form.

When a user views a webpage.

When a user downloads a file.

When a user reads an email.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can occur when a website accepts user input?

Directory Traversal

Phishing

Man-in-the-Middle

Denial of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of attack that can occur from user input?

Buffer Overflow

Command Injection

Cross-Site Scripting (XSS)

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cross-Site Scripting (XSS)?

An attack where malicious scripts are injected into trusted websites.

An attack that disrupts the service of a network.

An attack that intercepts communication between two parties.

An attack that encrypts data and demands ransom.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a Directory Traversal attack?

To delete files in the root folder

To access files outside the permitted system space

To encrypt files in the system

To create new files in the root folder

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tactic is used in a Directory Traversal attack?

Inserting a series of ../ characters into the URL or software code

Deleting system files

Encrypting the root folder

Creating new user accounts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a buffer overflow?

A situation where the data is smaller than the input variable can hold.

A situation where the data is larger than the input variable can hold and overflows into process execution space to run hostile code.

A situation where the data is exactly the size of the input variable.

A situation where the data is stored in the CPU.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?