adplus-dvertising
frame-decoration

Question

________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.

a.

XSS

b.

CSRF

c.

CRLF

d.

SQL

Answer: (c).CRLF

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a...

Similar Questions

Discover Related MCQs

Q. Which of the following scripting language is used for injecting executable malicious code for web-app hacking?

Q. ______________ takes advantage if hidden fields that work as the only security measure in some applications.

Q. _____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.

Q. Which of the following is not an example of web application hacking technique?

Q. _____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser.

Q. PUP is abbreviated as ____________

Q. Users might invite some bogus virus in his/her system by clicking the ____________

Q. Which among the following is not an abnormal symptom found once you click any malicious adware?

Q. Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.

Q. Creators of _____________ also sell your browsing behaviour & information to 3rd parties.

Q. Modern ____________ can even use it to target users with additional advertisements that are customized to the browsing habits.

Q. Creators of adware also sell your browsing behaviour & information to 3rd parties.

Q. Which among the following is not a symptom of your system compromised with adware?

Q. Malicious adware may sneak into your system by __________ different ways.

Q. Which of the following term is not a valid terminology and type of adware?

Q. Adware will not come to your system if you are using Chrome.

Q. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

Q. They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?

Q. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.

Q. Which of the following activity is not done by spyware?