9.2.2 User Input Security

9.2.2 User Input Security

12th Grade

22 Qs

quiz-placeholder

Similar activities

IC3 GS5 - KEY APPLICATION [EXERCISE 2]

IC3 GS5 - KEY APPLICATION [EXERCISE 2]

10th - 12th Grade

20 Qs

Empowerment Technologies

Empowerment Technologies

12th Grade

19 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

Python Basics (CodeHS)

Python Basics (CodeHS)

7th - 12th Grade

20 Qs

MIT app Inventor Review

MIT app Inventor Review

9th - 12th Grade

22 Qs

Computer Applications Quiz 4

Computer Applications Quiz 4

12th Grade

19 Qs

Thunkable App Development

Thunkable App Development

1st - 12th Grade

21 Qs

Final Exam P1.

Final Exam P1.

9th - 12th Grade

19 Qs

9.2.2 User Input Security

9.2.2 User Input Security

Assessment

Passage

Computers

12th Grade

Easy

Created by

Christine Rehwinkel

Used 3+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of user input?

When a user fills in a form.

When a user views a webpage.

When a user downloads a file.

When a user reads an email.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can occur when a website accepts user input?

Directory Traversal

Phishing

Man-in-the-Middle

Denial of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of attack that can occur from user input?

Buffer Overflow

Command Injection

Cross-Site Scripting (XSS)

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cross-Site Scripting (XSS)?

An attack where malicious scripts are injected into trusted websites.

An attack that disrupts the service of a network.

An attack that intercepts communication between two parties.

An attack that encrypts data and demands ransom.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a Directory Traversal attack?

To delete files in the root folder

To access files outside the permitted system space

To encrypt files in the system

To create new files in the root folder

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tactic is used in a Directory Traversal attack?

Inserting a series of ../ characters into the URL or software code

Deleting system files

Encrypting the root folder

Creating new user accounts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a buffer overflow?

A situation where the data is smaller than the input variable can hold.

A situation where the data is larger than the input variable can hold and overflows into process execution space to run hostile code.

A situation where the data is exactly the size of the input variable.

A situation where the data is stored in the CPU.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?