
SecQuiz -04
Authored by Abdul Rafay
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves sending spoofed requests to amplifiers to flood a victim
SYN flood
ICMP flood
Reflection attack
DNS poisoning
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a SYN flood attack primarily exploit?
Bandwidth limitations
The DNS lookup process
Vulnerable/Open TCP connections
Authentication protocols
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which firewall rule strategy minimizes risk by default?
Deny-lists
Stateful inspection
Allow-lists
Protocol matching
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the Same-Origin Policy (SOP)?
To enhance server-side security
To allow cross-origin resource sharing
To isolate documents from different origins
To encrypt JavaScript files
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following headers makes cookies inaccessible to JavaScript?
Secure
Expires
HttpOnly
Domain
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the "PRIMARY" difference between Reflected and Persistent XSS?
Reflected XSS requires user input; Persistent XSS does not
Persistent XSS is more dangerous than Reflected XSS
Persistent XSS stores payloads on the server; Reflected XSS does not
Reflected XSS cannot steal cookies, but Persistent XSS can
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of CSP in mitigating XSS?
It blocks all JavaScript execution
It prevents loading of untrusted scripts
It sanitizes user inputs
It replaces the Same-Origin Policy
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?