Tag: security

Questions Related to security

  1. Information Stealth.

  2. Sensitive Information Disclosure.

  3. Identity Theft.

  4. Cross-site scripting by MIME sniffing.


Correct Option: C
  1. Sensitive Information Disclosure.

  2. Configuration Management.

  3. Input validation.

  4. Vulnerable Cookie.


Correct Option: B

The amount and the item_id of bid is sent via the URL parameter in a bidding website, a user A sends same link to another user B with the manipulated parameter values, after clicking it the other user B finds out later that a bid has been placed on his behalf.

  1. Identity theft.

  2. XML Injection.

  3. Reflected cross-site scripting.

  4. Cross-site request forgery.


Correct Option: D
  1. Session fixation.

  2. Privilege escalation.

  3. Cross-site request forgery.

  4. Identity theft.


Correct Option: B

Name the attack: link to a fake website

  1. keylogger

  2. brute force

  3. phishing

  4. e-mail spoofing


Correct Option: C

Redirecting the traffic to a fake website by changing the details in user DNS

  1. Session hijacking

  2. Phishing

  3. Pharming

  4. MAC spoofing


Correct Option: C

Virtual Keyboard helps us to escape from which of the following attacks?

  1. phishing

  2. pharming

  3. session hijacking

  4. Keylogger


Correct Option: D

Which of the below attacks have no solution?

  1. phishing

  2. trojan-horse

  3. Social engineering

  4. session hijacking


Correct Option: C
  1. worm

  2. Trojan-horse

  3. script injection

  4. DOS attack


Correct Option: B