{"id":89804,"date":"2025-06-01T10:12:59","date_gmt":"2025-06-01T10:12:59","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=89804"},"modified":"2025-06-01T10:12:59","modified_gmt":"2025-06-01T10:12:59","slug":"what-is-clickjacking","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/","title":{"rendered":"What is clickjacking ?"},"content":{"rendered":"<p>What is clickjacking ?<\/p>\n<p>[amp_mcq option1=&#8221;A device that sends and receives data at every click in a bit second&#8221; option2=&#8221;A device which does\/counts clicks on internet&#8221; option3=&#8221;A malicious technique of tricking Web users into revealing confidential information&#8221; option4=&#8221;A digital process that is used to display an image on mobiles&#8221; correct=&#8221;option3&#8243;]<\/p>\n<div class=\"psc-box-pyq-exam-year-detail\">\n<div class=\"pyq-exam\">\n<div class=\"psc-heading\">This question was previously asked in<\/div>\n<div class=\"psc-title line-ellipsis\">UPSC CAPF &#8211; 2014<\/div>\n<\/div>\n<div class=\"pyq-exam-psc-buttons\"><a href=\"\/pyq\/pyq-upsc-capf-2014.pdf\" target=\"_blank\" class=\"psc-pdf-button\" rel=\"noopener\">Download PDF<\/a><a href=\"\/pyq-upsc-capf-2014\" target=\"_blank\" class=\"psc-attempt-button\" rel=\"noopener\">Attempt Online<\/a><\/div>\n<\/div>\n<section id=\"pyq-correct-answer\">\nClickjacking is a malicious technique used on the web to trick users into performing actions they did not intend, often leading to the revelation of confidential information or unauthorized actions.<br \/>\n<\/section>\n<section id=\"pyq-key-points\">\nThis is achieved by layering a transparent or opaque iframe containing a malicious page over a legitimate web page. Users are lured to click on what appears to be a benign element on the visible page (e.g., a button), but their click is actually registered by the hidden malicious layer. This allows attackers to hijack clicks, making users unknowingly click on buttons or links that execute harmful actions, such as transferring money, changing passwords, or revealing sensitive data.<br \/>\n<\/section>\n<section id=\"pyq-additional-information\">\nClickjacking is also known as a &#8220;UI redress attack&#8221;. Websites can protect against clickjacking using techniques like X-Frame-Options HTTP headers (like DENY or SAMEORIGIN) or JavaScript-based frame-breaking code.<br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>What is clickjacking ? [amp_mcq option1=&#8221;A device that sends and receives data at every click in a bit second&#8221; option2=&#8221;A device which does\/counts clicks on internet&#8221; option3=&#8221;A malicious technique of tricking Web users into revealing confidential information&#8221; option4=&#8221;A digital process that is used to display an image on mobiles&#8221; correct=&#8221;option3&#8243;] This question was previously asked &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"What is clickjacking ?\" class=\"read-more button\" href=\"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/#more-89804\">Detailed Solution<span class=\"screen-reader-text\">What is clickjacking ?<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1085],"tags":[1468,1113],"class_list":["post-89804","post","type-post","status-publish","format-standard","hentry","category-upsc-capf","tag-1468","tag-information-and-communication-technology","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is clickjacking ?<\/title>\n<meta name=\"description\" content=\"Clickjacking is a malicious technique used on the web to trick users into performing actions they did not intend, often leading to the revelation of confidential information or unauthorized actions. This is achieved by layering a transparent or opaque iframe containing a malicious page over a legitimate web page. Users are lured to click on what appears to be a benign element on the visible page (e.g., a button), but their click is actually registered by the hidden malicious layer. This allows attackers to hijack clicks, making users unknowingly click on buttons or links that execute harmful actions, such as transferring money, changing passwords, or revealing sensitive data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is clickjacking ?\" \/>\n<meta property=\"og:description\" content=\"Clickjacking is a malicious technique used on the web to trick users into performing actions they did not intend, often leading to the revelation of confidential information or unauthorized actions. This is achieved by layering a transparent or opaque iframe containing a malicious page over a legitimate web page. Users are lured to click on what appears to be a benign element on the visible page (e.g., a button), but their click is actually registered by the hidden malicious layer. This allows attackers to hijack clicks, making users unknowingly click on buttons or links that execute harmful actions, such as transferring money, changing passwords, or revealing sensitive data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-01T10:12:59+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is clickjacking ?","description":"Clickjacking is a malicious technique used on the web to trick users into performing actions they did not intend, often leading to the revelation of confidential information or unauthorized actions. This is achieved by layering a transparent or opaque iframe containing a malicious page over a legitimate web page. Users are lured to click on what appears to be a benign element on the visible page (e.g., a button), but their click is actually registered by the hidden malicious layer. This allows attackers to hijack clicks, making users unknowingly click on buttons or links that execute harmful actions, such as transferring money, changing passwords, or revealing sensitive data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/","og_locale":"en_US","og_type":"article","og_title":"What is clickjacking ?","og_description":"Clickjacking is a malicious technique used on the web to trick users into performing actions they did not intend, often leading to the revelation of confidential information or unauthorized actions. This is achieved by layering a transparent or opaque iframe containing a malicious page over a legitimate web page. Users are lured to click on what appears to be a benign element on the visible page (e.g., a button), but their click is actually registered by the hidden malicious layer. This allows attackers to hijack clicks, making users unknowingly click on buttons or links that execute harmful actions, such as transferring money, changing passwords, or revealing sensitive data.","og_url":"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2025-06-01T10:12:59+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/","url":"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/","name":"What is clickjacking ?","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2025-06-01T10:12:59+00:00","dateModified":"2025-06-01T10:12:59+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"description":"Clickjacking is a malicious technique used on the web to trick users into performing actions they did not intend, often leading to the revelation of confidential information or unauthorized actions. This is achieved by layering a transparent or opaque iframe containing a malicious page over a legitimate web page. Users are lured to click on what appears to be a benign element on the visible page (e.g., a button), but their click is actually registered by the hidden malicious layer. This allows attackers to hijack clicks, making users unknowingly click on buttons or links that execute harmful actions, such as transferring money, changing passwords, or revealing sensitive data.","breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/what-is-clickjacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"UPSC CAPF","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/upsc-capf\/"},{"@type":"ListItem","position":3,"name":"What is clickjacking ?"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/89804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=89804"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/89804\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=89804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=89804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=89804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}