Web Security Threats

Web Security Threats

收藏豆荚
剥了 1 次
年级:大学
科目:其他
PurePulsar
2025-11-04
11 颗豆豆
1. 多选题
30 秒
<p>The most common web attack is ?</p>

The most common web attack is ?

Brute Force Attack

Injection Attacks 

DDoS Attack

Data Tampering

2. 单选题
30 秒
<p>Magento2 use a non-default Admin URL from protecting</p>

Magento2 use a non-default Admin URL from protecting

SQL Injection attack

DDoS Attack

Brute Force Attack

Command Injection

3. 单选题
30 秒
<p>Magento2 escape the HTML pages for which kind of attacking?</p>

Magento2 escape the HTML pages for which kind of attacking?

Command Injection

Session Hijacking:

Data Tampering

XSS Injection

4. 单选题
30 秒
<p>Injection attacks injecting ( ) into web systems to steal or tamper with data</p>

Injection attacks injecting ( ) into web systems to steal or tamper with data

URL

malicious codes

database

dockerfile

5. 单选题
30 秒
<p>What kind of scripts are usually used for XSS Injection?</p>

What kind of scripts are usually used for XSS Injection?

JavaScript

HTML

Python

SQL

6. 单选题
30 秒
<p>Which of below password is a strong password?</p>

Which of below password is a strong password?

12345678

happy12345!

Hucxy142857!

password111@

7. 单选题
30 秒
<p>Brute Force Attack Use tools to batch-test ( ) to crack accounts with weak passwords</p>

Brute Force Attack Use tools to batch-test ( ) to crack accounts with weak passwords

usernames

passwords

usernames and passwords individually

usernames and passwords  combinations 

8. 单选题
30 秒
<p>The key of DDoS Attack is</p>

The key of DDoS Attack is

Attack the server 

the frequency of Attacking

the packet size of attacking

Distributed attacking nodes

9. 单选题
30 秒
<p>8.Which of the XSS attack happend only in client?</p>

8.Which of the XSS attack happend only in client?

Persisterd XSS

Reflected XSS

DOM XSS

SQL

10. 单选题
30 秒
<p>Which of the below is <strong>not</strong> Sensitive Data?</p>

Which of the below is not Sensitive Data?

Product ID

password

customer addresses

orders

11. 单选题
30 秒
<p>Which of the below attack does not need a tools?</p>

Which of the below attack does not need a tools?

Brute force Attack

Authentication and Authorization Attacks

DDoS Attack 

SQL Injection Attack

剥豆豆
金牌
会员
无限剥豆豆游戏,更详尽的游戏报告,更多学员的支持
仅需0.6/日
你可能喜欢
python的变量与赋值
剥了 2 次
test-week 7-9
剥了 2 次
Review Game
剥了 2 次
RENO15闯关大赛
剥了 2 次
维生素 E
剥了 2 次