2.3 Server Exploits Review

2.3 Server Exploits Review

10th - 11th Grade

•

55 Qs

quiz-placeholder

Similar activities

2.3.1 Cyber Securing Ecommerce Data

2.3.1 Cyber Securing Ecommerce Data

Cyber 2.3.1 - Securing eCommerce

Cyber 2.3.1 - Securing eCommerce

Cybersecurity XSS Quiz

Cybersecurity XSS Quiz

Cyber 3 Unit 3 Review Game

Cyber 3 Unit 3 Review Game

Cybersecurity Quiz

Cybersecurity Quiz

Cybersecurity EOC Vocab Pt 1

Cybersecurity EOC Vocab Pt 1

2.3 Server Exploits Review

2.3 Server Exploits Review

Assessment

Quiz

•

Computers

•

10th - 11th Grade

•

Practice Problem

•

Medium

Created by

Beverly Ross

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When programming a webpage, JavaScript is used to

Make sure the graphics are laid out well

Add forms to pages (like when you place an order)

Speed up the transmission of data

add logic to a web page & make it interactive

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When programming a web page, HTML is used for

to provide the highest level of security

organize the content on the page

determine who can access each page

create a log of the users activity on the page

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which tags in this code are JavaScript

<html> </html>

<script> </script>

<body> </body>

<p> </p>

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

XSS stands for

Extra Security System

Cross-site scripting

Extra Social Security

Cross-system Surveilance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT something hackers use Cross-site scripting for.

steal data

instigate a ping attack

take control over a computer

run malicious

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do hackers get the cross-site script onto another machine

Hidden in a photo of a webpage

Part of a downloadable file

Executed when a button is pressed on webpage

inserted into the web pages input fields

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When working in Cybersecurity Training Site (CTS), what were the levels of security available to test. Check all that apply.

sub par

low

medium

high

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers