{"id":50858,"date":"2024-04-15T23:16:27","date_gmt":"2024-04-15T23:16:27","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=50858"},"modified":"2024-04-15T23:16:27","modified_gmt":"2024-04-15T23:16:27","slug":"is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/","title":{"rendered":". . . . . . . . is an attack which forces an end user to execute unwanted actions on a web application in which he\/she is currently authenticated."},"content":{"rendered":"<p>[amp_mcq option1=&#8221;Cross-site scoring scripting&#8221; option2=&#8221;Cross-site request forgery&#8221; option3=&#8221;Two-factor authentication&#8221; option4=&#8221;Cross-site scripting&#8221; correct=&#8221;option3&#8243;]<!--more--><\/p>\n<p>The correct answer is: Cross-site request forgery (CSRF).<\/p>\n<p>Cross-site request forgery (CSRF) is a type of attack that occurs when a user is tricked into submitting a malicious request to a web application that they are currently authenticated to. This can be done by including a malicious link in an email or on a website that the user visits. When the user clicks on the link, their browser will automatically submit the malicious request to the web application, even if they do not intend to. This can allow the attacker to perform actions on the web application on behalf of the user, such as transferring money, making purchases, or changing account settings.<\/p>\n<p>Cross-site scripting (XSS) is a type of attack that occurs when a malicious script is injected into a web page that is then executed by a user&#8217;s browser. This can allow the attacker to steal the user&#8217;s cookies, session tokens, or other sensitive information.<\/p>\n<p>Two-factor authentication (2FA) is an additional security measure that requires users to provide two forms of identification in order to log in to a website or application. This can help to prevent unauthorized access, even if the user&#8217;s password is compromised.<\/p>\n<p>Cross-site scoring scripting is not a real attack. It is a made-up term that is not used in the security industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[amp_mcq option1=&#8221;Cross-site scoring scripting&#8221; option2=&#8221;Cross-site request forgery&#8221; option3=&#8221;Two-factor authentication&#8221; option4=&#8221;Cross-site scripting&#8221; correct=&#8221;option3&#8243;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[728],"tags":[],"class_list":["post-50858","post","type-post","status-publish","format-standard","hentry","category-cloud-computing","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>. . . . . . . . is an attack which forces an end user to execute unwanted actions on a web application in which he\/she is currently authenticated.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\". . . . . . . . is an attack which forces an end user to execute unwanted actions on a web application in which he\/she is currently authenticated.\" \/>\n<meta property=\"og:description\" content=\"[amp_mcq option1=&#8221;Cross-site scoring scripting&#8221; option2=&#8221;Cross-site request forgery&#8221; option3=&#8221;Two-factor authentication&#8221; option4=&#8221;Cross-site scripting&#8221; correct=&#8221;option3&#8243;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-15T23:16:27+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":". . . . . . . . is an attack which forces an end user to execute unwanted actions on a web application in which he\/she is currently authenticated.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/","og_locale":"en_US","og_type":"article","og_title":". . . . . . . . is an attack which forces an end user to execute unwanted actions on a web application in which he\/she is currently authenticated.","og_description":"[amp_mcq option1=&#8221;Cross-site scoring scripting&#8221; option2=&#8221;Cross-site request forgery&#8221; option3=&#8221;Two-factor authentication&#8221; option4=&#8221;Cross-site scripting&#8221; correct=&#8221;option3&#8243;]","og_url":"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2024-04-15T23:16:27+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/","url":"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/","name":". . . . . . . . is an attack which forces an end user to execute unwanted actions on a web application in which he\/she is currently authenticated.","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2024-04-15T23:16:27+00:00","dateModified":"2024-04-15T23:16:27+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/is-an-attack-which-forces-an-end-user-to-execute-unwanted-actions-on-a-web-application-in-which-he-she-is-currently-authenticated\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"mcq","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/"},{"@type":"ListItem","position":3,"name":"Cloud computing","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/cloud-computing\/"},{"@type":"ListItem","position":4,"name":". . . . . . . . is an attack which forces an end user to execute unwanted actions on a web application in which he\/she is currently authenticated."}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/50858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=50858"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/50858\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=50858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=50858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=50858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}