SecQuiz -04

SecQuiz -04

University

10 Qs

quiz-placeholder

Similar activities

PHP Basics

PHP Basics

University

10 Qs

OWASP Top 10

OWASP Top 10

University

15 Qs

Keamanan Web & Aplikasi

Keamanan Web & Aplikasi

University

10 Qs

Test Quiz Basic Programming

Test Quiz Basic Programming

University

12 Qs

WE Quiz #2

WE Quiz #2

University

10 Qs

Bitcoin Quiz

Bitcoin Quiz

University

13 Qs

Vectores de Ataque

Vectores de Ataque

University

10 Qs

pbw 14

pbw 14

University

10 Qs

SecQuiz -04

SecQuiz -04

Assessment

Quiz

Computers

University

Hard

Created by

Abdul Rafay

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves sending spoofed requests to amplifiers to flood a victim

SYN flood

ICMP flood

Reflection attack

DNS poisoning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a SYN flood attack primarily exploit?

Bandwidth limitations

The DNS lookup process

Vulnerable/Open TCP connections

Authentication protocols

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which firewall rule strategy minimizes risk by default?

Deny-lists

Stateful inspection

Allow-lists

Protocol matching

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Same-Origin Policy (SOP)?

To enhance server-side security

To allow cross-origin resource sharing

To isolate documents from different origins

To encrypt JavaScript files

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following headers makes cookies inaccessible to JavaScript?

Secure

Expires

HttpOnly

Domain

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the "PRIMARY" difference between Reflected and Persistent XSS?

Reflected XSS requires user input; Persistent XSS does not

Persistent XSS is more dangerous than Reflected XSS

Persistent XSS stores payloads on the server; Reflected XSS does not

Reflected XSS cannot steal cookies, but Persistent XSS can

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of CSP in mitigating XSS?

It blocks all JavaScript execution

It prevents loading of untrusted scripts

It sanitizes user inputs

It replaces the Same-Origin Policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?