Web application Vulnerabilities

Web application Vulnerabilities

4th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

"Antygona" 1h

"Antygona" 1h

1st - 6th Grade

16 Qs

Datora sastāvdaļas

Datora sastāvdaļas

7th Grade

11 Qs

Dziecięctwo Jezusa - Mt

Dziecięctwo Jezusa - Mt

6th - 8th Grade

17 Qs

Antygona

Antygona

9th Grade

17 Qs

Greek & Latin Roots 5

Greek & Latin Roots 5

4th Grade

15 Qs

Kot w butach

Kot w butach

2nd - 4th Grade

12 Qs

Bogowie greccy

Bogowie greccy

5th - 8th Grade

12 Qs

Stoliczku nakryj się - test

Stoliczku nakryj się - test

1st - 5th Grade

12 Qs

Web application Vulnerabilities

Web application Vulnerabilities

Assessment

Quiz

Education

4th - 11th Grade

Medium

Created by

Hy Fernz

Used 38+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The space efficiency of RAID 5 when 5 disks are used is

70%

80%

90%

100%

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The following RAID configurations were proposed to a company for a critical file server:

Configuration:

A) RAID0 5 DISKS 200GB per DISK

B) RAID1 4 DISKS 400GB per DISK

C) RAID5 5 DISKS 300GB per DISK

Which of the configuration ( A,B or C) allows the most amount of usable disk storage space?

A

B

C

ALL SAME

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Identify ALL the possible network attacks based on the traffic logs above. List them down one by one below:

Log 1 Smurf flood, Log 2 TCP Ack flood, Log 3 Normal Traffic

Log 1 SYN flood, Log 2 TCP Ack Flood, Log 3 Syn Flood

Log 1 TCP flood, Log 2 TCP Ack Flood, Log 3 Syn Flood

Log 1 SYN ACK flood, Log 2 TCP Ack Flood, Log 3 Syn Flood

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. The space efficiency of RAID 6 when 8 disks are used is

82%

75%

87.5%

88.5%

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You are monitoring network traffic and you notice a packet with pass’ or 1=1 – in the content. What type of attack has occurred?

Buffer overflow

Sql injection

Folder traversal

Cross site scripting

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A hacker tries to submit script into a field in a web application. What type of attack is this?

Buffer overflow

Sql injection

.Folder traversal

Cross site scripting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Cookies personalize a person's web search

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?