What is a vulnerability that allows criminal to inject scripts into web pages viewed by users?

Oct 1, 2020 Last Updated: May 23, 2022 No Comments

Show

IT Questions BankCategory: CCNA CyberOpsWhat is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

28. What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

  • Cross-site scripting
  • XML injection
  • buffer overflow
  • SQL injection

Explanation: Cross-site scripting (XSS) allows criminals to inject scripts that contain malicious code into web applications.

More Questions: Modules 13 – 17: Threats and Attacks Group Exam
More Questions: Cybersecurity Essentials Chapter 3 Quiz Answers

Please login or Register to submit your answer

What is a vulnerability that allows criminal to inject scripts into web pages viewed by users?
report this ad

Last Updated on December 11, 2018 by

  • Recommend

This quiz covers the content in Cybersecurity Essentials 1.1 Chapter 3. It is designed to provide an additional opportunity to practice the skills and knowledge presented in the chapter and to help prepare for the final quiz.

  1. What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

    • buffer overflow
    • SQL injection
    • XML injection
    • Cross-site scripting

      Explanation:

  2. What type of attack targets an SQL database using the input field of a user?

    • buffer overflow
    • SQL injection
    • XML injection
    • Cross-site scripting

      Explanation:

  3. Which two reasons describe why WEP is a weak protocol? (Choose two.)

    • WEP uses the same encryption features as Bluetooth.
    • Everyone on the network uses a different key.
    • The key is static and repeats on a congested network.
    • The default settings cannot be modified.
    • The key is transmitted in clear text.

      Explanation:

  4. What is the difference between a virus and a worm?

    • Viruses hide in legitimate programs but worms do not.
    • Worms self-replicate but viruses do not.
    • Viruses self-replicate but worms do not.
    • Worms require a host file but viruses do not.

      Explanation:

  5. A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

    • phishing
    • adware
    • spyware
    • virus

      Explanation:

  6. What is the meaning of the term logic bomb?

    • a malicious worm
    • a malicious program that uses a trigger to awaken the malicious code
    • a malicious virus
    • a malicious program that hides itself in a legitimate program

      Explanation:

  7. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

    • Trojan
    • vishing
    • phishing
    • backdoor
    • social engineering

      Explanation:

  8. What are two ways to protect a computer from malware? (Choose two.)

    • Empty the browser cache.
    • Use antivirus software.
    • Delete unused software.
    • Keep software up to date.
    • Defragment the hard disk.

      Explanation:

  9. What occurs on a computer when data goes beyond the limits of a buffer?

    • a buffer overflow
    • a system exception
    • an SQL injection
    • cross-site scripting

      Explanation:

  10. What is the term used to describe an email that is targeting a specific person employed at a financial institution?

    • spam
    • vishing
    • spear phishing
    • target phishing
    • spyware

      Explanation:

  11. An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?

    • RF jamming
    • smishing
    • bluejacking
    • bluesnarfing

      Explanation:

  12. What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

    • intimidation
    • compassion
    • honesty
    • urgency
    • integrity

      Explanation:

  13. What are two common indicators of spam mail? (Choose two.)

    • The email has keywords in it.
    • The email has misspelled words or punctuation errors or both.
    • The email is from your supervisor.
    • The email is from a friend.
    • The email has no subject line.
    • The email has an attachment that is a receipt for a recent purchase.

      Explanation:

  14. Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

    • spam
    • smishing
    • grayware
    • impersonation

      Explanation:

  15. A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

    • a type of logic bomb
    • a type of virus
    • a type of worm
    • a type of ransomware

      Explanation:

  16. What is the name for the type of software that generates revenue by generating annoying pop-ups?

    • spyware
    • trackers
    • pop-ups
    • adware

      Explanation:

  17. What does a rootkit modify?

    • Microsoft Word
    • Notepad
    • screen savers
    • programs
    • operating system

      Explanation:

  18. What is the name given to a program or program code that bypasses normal authentication?

    • virus
    • worm
    • ransomware
    • Trojan
    • backdoor

      Explanation:

  • Recommend

What is a vulnerability that allows criminals to inject scripts into web pages viewed?

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users? Explanation: Cross-site scripting (XSS) allows criminals to inject scripts that contain malicious code into web applications.

Which two reasons describe why WEP is a weak protocol?

1. The key is transmitted in clear text . 2. The key is static and repeats on congested network.

What vulnerability occurs when data is written beyond the memory areas allocated to an application?

A buffer overflow happens when a program either tries to place data in a memory area past the buffer, or attempts to put more data in a buffer than it can hold. Writing data beyond an allocated memory block's bounds can crash the program, corrupt data, or allow an attacker to execute malicious code.

Which term describes the impersonation of another computer or device?

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.