2.3 Server Exploits Review

2.3 Server Exploits Review

10th - 11th Grade

55 Qs

quiz-placeholder

Similar activities

Network+ Ports

Network+ Ports

9th - 12th Grade

60 Qs

Networking Unit 2 Review

Networking Unit 2 Review

11th - 12th Grade

56 Qs

Networking III/IV 4.1-4.5 Test Review

Networking III/IV 4.1-4.5 Test Review

9th - 12th Grade

52 Qs

MTA Exam 98-366: Networking Fundamentals

MTA Exam 98-366: Networking Fundamentals

11th Grade

50 Qs

SOAL JARINGAN MIKROTIK DASAR

SOAL JARINGAN MIKROTIK DASAR

11th Grade

50 Qs

ULANGAN HARIAN 1 AIJ KELAS 12 - FIREWALL

ULANGAN HARIAN 1 AIJ KELAS 12 - FIREWALL

10th Grade

60 Qs

Internet Hardware

Internet Hardware

9th Grade - University

60 Qs

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

11th Grade - Professional Development

50 Qs

2.3 Server Exploits Review

2.3 Server Exploits Review

Assessment

Quiz

Computers

10th - 11th Grade

Medium

Created by

Beverly Ross

Used 12+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When programming a webpage, JavaScript is used to

Make sure the graphics are laid out well

Add forms to pages (like when you place an order)

Speed up the transmission of data

add logic to a web page & make it interactive

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When programming a web page, HTML is used for

to provide the highest level of security

organize the content on the page

determine who can access each page

create a log of the users activity on the page

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which tags in this code are JavaScript

<html> </html>

<script> </script>

<body> </body>

<p> </p>

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

XSS stands for

Extra Security System

Cross-site scripting

Extra Social Security

Cross-system Surveilance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT something hackers use Cross-site scripting for.

steal data

instigate a ping attack

take control over a computer

run malicious

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do hackers get the cross-site script onto another machine

Hidden in a photo of a webpage

Part of a downloadable file

Executed when a button is pressed on webpage

inserted into the web pages input fields

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When working in Cybersecurity Training Site (CTS), what were the levels of security available to test. Check all that apply.

sub par

low

medium

high

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?