Web application Vulnerabilities

Web application Vulnerabilities

4th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

TCAP Power Night

TCAP Power Night

1st - 5th Grade

14 Qs

The Volcano That Changed the World

The Volcano That Changed the World

5th Grade

10 Qs

Interdependence in Living Beings - Plants and Animals

Interdependence in Living Beings - Plants and Animals

5th - 9th Grade

13 Qs

Makbet

Makbet

10th Grade

17 Qs

Library Refresher

Library Refresher

10th Grade

12 Qs

QUIZ BINSAI KAMIS 11-11-21

QUIZ BINSAI KAMIS 11-11-21

1st Grade - University

10 Qs

Personajes del Libro del Libro de la Selva

Personajes del Libro del Libro de la Selva

1st - 5th Grade

13 Qs

Akun Belajar Id

Akun Belajar Id

6th Grade

10 Qs

Web application Vulnerabilities

Web application Vulnerabilities

Assessment

Quiz

Education

4th - 11th Grade

Practice Problem

Medium

Created by

Hy Fernz

Used 38+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The space efficiency of RAID 5 when 5 disks are used is

70%

80%

90%

100%

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The following RAID configurations were proposed to a company for a critical file server:

Configuration:

A) RAID0 5 DISKS 200GB per DISK

B) RAID1 4 DISKS 400GB per DISK

C) RAID5 5 DISKS 300GB per DISK

Which of the configuration ( A,B or C) allows the most amount of usable disk storage space?

A

B

C

ALL SAME

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Identify ALL the possible network attacks based on the traffic logs above. List them down one by one below:

Log 1 Smurf flood, Log 2 TCP Ack flood, Log 3 Normal Traffic

Log 1 SYN flood, Log 2 TCP Ack Flood, Log 3 Syn Flood

Log 1 TCP flood, Log 2 TCP Ack Flood, Log 3 Syn Flood

Log 1 SYN ACK flood, Log 2 TCP Ack Flood, Log 3 Syn Flood

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. The space efficiency of RAID 6 when 8 disks are used is

82%

75%

87.5%

88.5%

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You are monitoring network traffic and you notice a packet with pass’ or 1=1 – in the content. What type of attack has occurred?

Buffer overflow

Sql injection

Folder traversal

Cross site scripting

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A hacker tries to submit script into a field in a web application. What type of attack is this?

Buffer overflow

Sql injection

.Folder traversal

Cross site scripting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Cookies personalize a person's web search

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?