Hacksplaining

Hacksplaining

11th - 12th Grade

41 Qs

quiz-placeholder

Similar activities

CS my SQL without functions

CS my SQL without functions

12th Grade

40 Qs

Próbny INF.03 2022

Próbny INF.03 2022

12th Grade

40 Qs

Class 12 RDBMS

Class 12 RDBMS

7th - 12th Grade

40 Qs

Quiz Pemrograman dan Networking Python

Quiz Pemrograman dan Networking Python

11th Grade

37 Qs

EMAIL SERVER DAN DATABASE SERVER

EMAIL SERVER DAN DATABASE SERVER

12th Grade

40 Qs

STRUCTURED QUERY LANGUAGE

STRUCTURED QUERY LANGUAGE

12th Grade

46 Qs

Database - Full Quiz

Database - Full Quiz

8th - 12th Grade

41 Qs

UAS - Pengantar Literasi Digital

UAS - Pengantar Literasi Digital

12th Grade

40 Qs

Hacksplaining

Hacksplaining

Assessment

Quiz

Computers

11th - 12th Grade

Hard

Used 13+ times

FREE Resource

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

SELECT *

FROM users

WHERE email = 'user@email.com'

AND pass = '' or 1=1--' LIMIT 1


This is an example of...

SQL Injection

Cross Site Scripting

Session Fixation

Broken Access Control

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

SQL Injection Can Be Used To...

Extract sensitive information

Enumerate the authentication details of users registered on a website

Delete data or drop tables

Inject further malicious code

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

SQL Injection is relatively uncommon nowadays.

True

False

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Programming languages talk to databases through:

Database Drivers

Custom API Requests

Direct Communication

Quantum Relays

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are parameterized statements? (More than 1 answer!)

A method for providing SQL statements in a safe, secure manner

A method for providing SQL statements that is unsafe

The SQL command is passed separately from the data to be executed

The SQL command is passed together with the data to be executed

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A website that allows users to embed their own Javascript code will be vulnerable to:


(More than 1 possible answer!)

Cross Site Scripting

Session Hijacking

DDOS

Broken Access Control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A website converts website names to IP addresses using the nslookup command.


On the website, the hacker types into the box "google.com && echo "Hello"


What is this an example of?

Command Execution

Cross Site Scripting

Broken Access Control

Open Redirects

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?