Web based attacks 2025

Web based attacks 2025

University

20 Qs

quiz-placeholder

Similar activities

Network Advantages and Disadvantages

Network Advantages and Disadvantages

10th Grade - University

15 Qs

Network Defence

Network Defence

University

20 Qs

Introduction to Django Framework Quiz

Introduction to Django Framework Quiz

University

15 Qs

ISA111 - QUIZ #1

ISA111 - QUIZ #1

University

21 Qs

Round 1 ( RHA Learner Contest )

Round 1 ( RHA Learner Contest )

University

20 Qs

Data Security Worksheet

Data Security Worksheet

10th Grade - University

15 Qs

CIS2303 Week 4_5 Ch_3

CIS2303 Week 4_5 Ch_3

University

18 Qs

Web Systems Quiz - ICT 121

Web Systems Quiz - ICT 121

University

20 Qs

Web based attacks 2025

Web based attacks 2025

Assessment

Quiz

Computers

University

Medium

Created by

Joseph Raymond V

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...vulnerabilities refer to the security risks that the organization identifies and documents.

OWASP

NIST

GCCP

OSNT

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...refers to the inadequate protection of sensitive data, both in transit and at rest.

Protection Failures

Network Failures

Transit Failures

Cryptographic Failures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a broad category of vulnerabilities where an attacker can send malicious data to an application, causing it to execute unintended commands.

Backdoor

Information Stealer

Injection

Botnet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... vulnerability allows an attacker to coerce the server-side application into making requests to an unintended location, potentially exposing internal services or data.

External-Side Request Forgery

Server-Side Request Forgery

Client-Side Request Forgery

Internal-Side Request Forgery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a common and dangerous web security vulnerability that allows an attacker to inject malicious client-side scripts into web pages viewed by other users.

XSS

CSS

MSS

VSS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

... allows the attacker to embed executable code that the browser will interpret as part of the legitimate page.

Data input

User Input

Code Input

Page input

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker to embed executable code that the browser will interpret as part of the legitimate page called as..

clone

steal

deface

harvest

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?