Decoded: The Cybersecurity Podcast

Part 8 - CEH v12 Practice Questions: Web Application Attack Fundamentals: 15 Questions


Listen Later

Part 8: Web Application Attacks (15 Questions)

Which attack exploits unsanitized user input to execute malicious SQL commands?

• A) Cross-Site Scripting (XSS)

• B) SQL Injection (SQLi)

• C) Directory Traversal

• D) Session Hijacking

Answer: B) SQL Injection (SQLi)

Which web attack aims to execute malicious scripts in a victim’s browser via trusted websites?

• A) Cross-Site Scripting (XSS)

• B) Cross-Site Request Forgery (CSRF)

• C) Broken Authentication

• D) IDOR Attack

Answer: A) Cross-Site Scripting (XSS)

What is the primary goal of a Cross-Site Request Forgery (CSRF) attack?

• A) To trick the victim into executing unintended actions on a trusted site

• B) To capture session cookies

• C) To escalate user privileges

• D) To perform remote code execution

Answer: A) To trick the victim into executing unintended actions on a trusted site

Which HTTP method is most commonly exploited in file upload vulnerabilities?

• A) GET

• B) POST

• C) PUT

• D) DELETE

Answer: C) PUT

An attacker manipulates URL parameters to gain unauthorized access to resources. What attack is this?

• A) IDOR Attack

• B) CSRF Attack

• C) XSS Attack

• D) SQL Injection

Answer: A) IDOR Attack

What security vulnerability allows attackers to bypass authentication mechanisms via URL manipulation?

• A) Directory Traversal

• B) Command Injection

• C) Path Manipulation

• D) Broken Access Control

Answer: D) Broken Access Control

Which attack relies on injecting malicious commands directly into a vulnerable web application’s operating system?

• A) SQL Injection

• B) Command Injection

• C) Remote File Inclusion (RFI)

• D) Cross-Site Scripting (XSS)

Answer: B) Command Injection

Which web attack technique manipulates input fields to bypass client-side validation and inject malicious payloads?

• A) Form Injection

• B) SQL Injection

• C) Buffer Overflow

• D) LDAP Injection

Answer: D) LDAP Injection

What security header can help mitigate Cross-Site Scripting (XSS) attacks?

• A) X-Content-Type-Options

• B) Strict-Transport-Security

• C) Content-Security-Policy (CSP)

• D) Cache-Control

Answer: C) Content-Security-Policy (CSP)

Which web attack exploits weak session management by stealing or predicting session tokens?

• A) Clickjacking

• B) Cookie Poisoning

• C) Session Hijacking

• D) IDOR Attack

Answer: C) Session Hijacking

What is the primary goal of a Clickjacking attack?

• A) To inject malicious code into web forms

• B) To trick users into clicking invisible elements

• C) To modify cookie values

• D) To manipulate URL parameters

Answer: B) To trick users into clicking invisible elements

An attacker uses ../../etc/passwd in a URL to gain unauthorized access to system files. What attack is this?

• A) SQL Injection

• B) Directory Traversal

• C) Remote File Inclusion (RFI)

• D) Path Manipulation

Answer: B) Directory Traversal

Which OWASP Top 10 vulnerability relates to failing to properly validate uploaded files?

• A) Injection

• B) Security Misconfiguration

• C) Insecure Deserialization

• D) Unrestricted File Upload

Answer: D) Unrestricted File Upload

What type of attack involves including malicious scripts in web pages that execute on other users’ browsers?

• A) DOM-based XSS

• B) Stored XSS

• C) Reflected XSS

• D) Blind XSS

Answer: B) Stored XSS

Which tool is widely used for discovering web application vulnerabilities through automated scanning?

• A) Hydra

• B) Nikto

• C) John the Ripper

• D) Metasploit

Answer: B) Niktoissues.

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Up First from NPR by NPR

Up First from NPR

56,391 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,010 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

134 Listeners

David Bombal by David Bombal

David Bombal

25 Listeners