Web/System Exploitation

Web/System Exploitation

1st Grade - Professional Development

9 Qs

quiz-placeholder

Similar activities

Advanced Scripts in Scratch

Advanced Scripts in Scratch

5th Grade

14 Qs

HCI - U4

HCI - U4

University

10 Qs

Chromebook Rules at SES

Chromebook Rules at SES

2nd - 5th Grade

13 Qs

Video Watermaking

Video Watermaking

University

11 Qs

Atividade de Pensamento Computacional.

Atividade de Pensamento Computacional.

9th Grade

13 Qs

EMPTECH L4 Q3

EMPTECH L4 Q3

12th Grade

10 Qs

การออกแบบและเทคโนโลยี ปลายภาค

การออกแบบและเทคโนโลยี ปลายภาค

9th Grade

10 Qs

PSI_KELAS 5B_PERTEMUAN 2

PSI_KELAS 5B_PERTEMUAN 2

University

10 Qs

Web/System Exploitation

Web/System Exploitation

Assessment

Quiz

Computers

1st Grade - Professional Development

Easy

Created by

Idiot I am

Used 6+ times

FREE Resource

9 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Media Image

The main web programming languages are HTML, JSS, CSS, and ___.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Exploiting vulnerable javascript is called what?

Backdooring

Cross-site scripting

Reconnaissance

Programming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Connecting to a website using unauthorized software planted in the website itself is called what?

Cross-site scripting

Malware

Web development

Backdooring

4.

MULTIPLE CHOICE QUESTION

20 sec • Ungraded

Media Image

If you found a vulnerability in a website, what would you do?

Contact the sysadmin that runs the site

Use the exploit to patch itself

Add that website to a list of vulnerable sites

It probably will be patched later...

Destruction!

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Write a short sentence about a vulnerable site you may have found.

Evaluate responses using AI:

OFF

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three types of hackers?

Orange hat

White hat

Purple hat

Black hat

Grey hat

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

ILOVEYOU was an e-mail ____.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the operating system with the least malware developed for it?

Windows

GNU/Linux

MacOS

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software disguises itself as another program to fool the user?

Trojan

Worm

Virus