Search Header Logo

Web/System Exploitation

Authored by Idiot I am

Computers

1st Grade - Professional Development

Used 6+ times

Web/System Exploitation
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Media Image

The main web programming languages are HTML, JSS, CSS, and ___.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Exploiting vulnerable javascript is called what?

Backdooring

Cross-site scripting

Reconnaissance

Programming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Connecting to a website using unauthorized software planted in the website itself is called what?

Cross-site scripting

Malware

Web development

Backdooring

4.

MULTIPLE CHOICE QUESTION

20 sec • Ungraded

Media Image

If you found a vulnerability in a website, what would you do?

Contact the sysadmin that runs the site

Use the exploit to patch itself

Add that website to a list of vulnerable sites

It probably will be patched later...

Destruction!

5.

OPEN ENDED QUESTION

3 mins • Ungraded

Write a short sentence about a vulnerable site you may have found.

Evaluate responses using AI:

OFF

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three types of hackers?

Orange hat

White hat

Purple hat

Black hat

Grey hat

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

ILOVEYOU was an e-mail ____.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?