10 Questions
A user's POST request will provide the variables user and ______
pass
The problem with this is the use of concatenation to combine the data SELECT id FROM users WHERE username='user' AND password=' pass' OR ___
1=1
Code Injection is a commonly known threat in which attackers exploit input validation flaws to introduce malicious ____ into an application.
code
Threat actors leverage on code injection vulnerabilities to embed malicious code which the application interprets and ______.
executes
The malicious code is typically built to control data flow leading to loss of ______ and reduced application availability.
confidentiality
To prevent Code Injection Attacks, utilize Whitelisting for input validation. This ensures that only pre-approved programs can run on a protected computer ensuring that malicious codes are ______.
blocked
Encode HTML outputs converts malicious input into safe representations, so that the data can be displayed but not executed as _____.
code
Use Parameterized Queries and Criteria-Based APIs to interpret user data strings. This ensures that APIs do not accept any string values other than those ______.
specified
_______ is a threat where attackers redirect a website's traffic to a fake site to steal sensitive information.
Pharming
_______ is a targeted form of phishing that focuses on specific individuals or organizations.
Spear Phishing
Test your knowledge on different types of cyber attacks including Phishing, Whaling (CEO Fraud), and Pharming. Learn about how attackers target high-profile employees and redirect victims to fraudulent websites to steal sensitive information.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free