Search Header Logo

Cyber 3 Unit 3 Review Game

Authored by Jason Felt

Computers

11th - 12th Grade

Used 2+ times

Cyber 3 Unit 3 Review Game
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following approaches is an effective way of protecting yourself against SQL injection?

Using parameterized statements in your code.

Moving your database to a separate server.

Frequently rotating your database passwords.

Using HTTPS in your website.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an attacker manages to store malicious JavaScript in your database, what could they do? Choose all that apply.

Deface your website.

Redirect other users to malicious sites.

Hijack other users' sessions.

Drop important tables in your database.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How can you prevent XSS attacks? Choose all that apply.

Escape dynamic content when it is written out in HTML.

Ask the user to disable JavaScript in their browser.

Obfuscate your JavaScript.

Whitelist permitted values for dynamic fields.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How could an attacker exploit a command execution vulnerability?

Set up a fake website that looks like your site on a copycat domain.

Summoning evil spirits and placing a curse on your database.

Installing malicious code and making your server part of a botnet.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tag is typically used in a clickjacking attack to wrap another site?

<script>

<iframe>

<center>

<blink>

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of anti-forgery tokens?

Validating that a request is generated by a page that is connected to the same website.

Validating a password.

Validating a credit card number the user has entered.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following methods can circumvent directory traversal vulnerabilities? Choose all that apply.

Keep static documents on a separate file system from your executable code.

Making users change their password frequently.

Storing documents in a content management system.

Hiring private security guards to grimace at anyone approaching your servers.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?