Cyber 3 Unit 3 Review Game

Cyber 3 Unit 3 Review Game

11th - 12th Grade

40 Qs

quiz-placeholder

Similar activities

System Vulnerabilities 1

System Vulnerabilities 1

12th Grade

40 Qs

U2.Short answer questions

U2.Short answer questions

12th Grade

35 Qs

Word 2016 Form 3

Word 2016 Form 3

9th - 12th Grade

35 Qs

Unit 3 - Introduction to Algorithms Review

Unit 3 - Introduction to Algorithms Review

9th - 12th Grade

45 Qs

CSP Unit 3 Review

CSP Unit 3 Review

9th - 12th Grade

40 Qs

English For IT 5: Unit 3

English For IT 5: Unit 3

1st Grade - Professional Development

40 Qs

ITE8 - Module 3 Quiz

ITE8 - Module 3 Quiz

12th Grade

40 Qs

AAQ IT Unit 2 A2.2 Attack Vectors

AAQ IT Unit 2 A2.2 Attack Vectors

11th - 12th Grade

40 Qs

Cyber 3 Unit 3 Review Game

Cyber 3 Unit 3 Review Game

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Jason Felt

Used 2+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following approaches is an effective way of protecting yourself against SQL injection?

Using parameterized statements in your code.

Moving your database to a separate server.

Frequently rotating your database passwords.

Using HTTPS in your website.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an attacker manages to store malicious JavaScript in your database, what could they do? Choose all that apply.

Deface your website.

Redirect other users to malicious sites.

Hijack other users' sessions.

Drop important tables in your database.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How can you prevent XSS attacks? Choose all that apply.

Escape dynamic content when it is written out in HTML.

Ask the user to disable JavaScript in their browser.

Obfuscate your JavaScript.

Whitelist permitted values for dynamic fields.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How could an attacker exploit a command execution vulnerability?

Set up a fake website that looks like your site on a copycat domain.

Summoning evil spirits and placing a curse on your database.

Installing malicious code and making your server part of a botnet.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tag is typically used in a clickjacking attack to wrap another site?

<script>

<iframe>

<center>

<blink>

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of anti-forgery tokens?

Validating that a request is generated by a page that is connected to the same website.

Validating a password.

Validating a credit card number the user has entered.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following methods can circumvent directory traversal vulnerabilities? Choose all that apply.

Keep static documents on a separate file system from your executable code.

Making users change their password frequently.

Storing documents in a content management system.

Hiring private security guards to grimace at anyone approaching your servers.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers