Question
Which of the following attacks can occur when a user is
tricked into performing unintended actions on a trusted website without their knowledge?Solution
CSRF is an attack where an authenticated user is tricked into performing actions on a website without their consent. The attacker typically sends a malicious link or embeds it in a third-party site, and when the user clicks it, their browser unknowingly sends authenticated requests to the targeted application. This can result in unauthorized transactions, account modifications, or data theft. CSRF exploits the trust that the application places in the user's browser, relying on the lack of proper anti-CSRF measures like tokens. For example, a user logged into their bank account could unknowingly approve a transfer initiated by an attacker. Why Other Options Are Incorrect :
- SQL Injection : This involves injecting malicious queries into databases, unrelated to user actions.
- Distributed Denial-of-Service (DDoS) : This overwhelms servers, making websites unavailable, but doesn’t involve tricking users.
- Credential Stuffing : This uses leaked credentials to gain unauthorized access, unrelated to unintended user actions.
- Buffer Overflow : This exploits memory allocation vulnerabilities, not user behavior.
Which of the following statements is/are correct in the context of River Brahmaputra?
1. It is known as Tsangpo in Tibet and Yarlung Zangbo in Ch...
In which year did King George V assume the crown of India?
Which one of the following is India’s largest Butterfly?
By how many basis points was the interest rate applicable to the Sukanya Samriddhi scheme increased?
Which of the following exoplanets of the size between Mars and Earth was discovered by NASA’s Transiting Exoplanet Survey Satellite in June 2019?
What was approved by the Union Cabinet chaired by Prime Minister Shri Narendra Modi regarding the establishment of the International Big Cat Alliance (I...
‘Fyn', an integrated digital platform for business banking and corporate clients, offering digital banking and value-added services across all produc...
"Indian Forest Act" was enacted in the year ______.Â
The Khalji Dynasty ruled over Delhi from ______.
Which description is appropriate among the following for ‘E-Governance’?