Web based attacks 2025

Web based attacks 2025

University

20 Qs

quiz-placeholder

Similar activities

SS_tut4

SS_tut4

University

18 Qs

Domain 1 - Network Security

Domain 1 - Network Security

9th Grade - University

20 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

SRWE-Refreshing Activity

SRWE-Refreshing Activity

University

18 Qs

Technology Terminoloy (Wireless Security Unit 1)

Technology Terminoloy (Wireless Security Unit 1)

University - Professional Development

17 Qs

 SEXXC ++

SEXXC ++

University

17 Qs

TestOut SecurityPro (8.2-8.5)

TestOut SecurityPro (8.2-8.5)

University

19 Qs

SQLI exam

SQLI exam

University

21 Qs

Web based attacks 2025

Web based attacks 2025

Assessment

Quiz

Computers

University

Medium

Created by

Joseph Raymond V

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...vulnerabilities refer to the security risks that the organization identifies and documents.

OWASP

NIST

GCCP

OSNT

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...refers to the inadequate protection of sensitive data, both in transit and at rest.

Protection Failures

Network Failures

Transit Failures

Cryptographic Failures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a broad category of vulnerabilities where an attacker can send malicious data to an application, causing it to execute unintended commands.

Backdoor

Information Stealer

Injection

Botnet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... vulnerability allows an attacker to coerce the server-side application into making requests to an unintended location, potentially exposing internal services or data.

External-Side Request Forgery

Server-Side Request Forgery

Client-Side Request Forgery

Internal-Side Request Forgery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a common and dangerous web security vulnerability that allows an attacker to inject malicious client-side scripts into web pages viewed by other users.

XSS

CSS

MSS

VSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... allows the attacker to embed executable code that the browser will interpret as part of the legitimate page.

Data input

User Input

Code Input

Page input

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker to embed executable code that the browser will interpret as part of the legitimate page called as..

clone

steal

deface

harvest

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?