
Cyber 3 Unit 3 Review Game
Authored by Jason Felt
Computers
11th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following approaches is an effective way of protecting yourself against SQL injection?
Using parameterized statements in your code.
Moving your database to a separate server.
Frequently rotating your database passwords.
Using HTTPS in your website.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
If an attacker manages to store malicious JavaScript in your database, what could they do? Choose all that apply.
Deface your website.
Redirect other users to malicious sites.
Hijack other users' sessions.
Drop important tables in your database.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
How can you prevent XSS attacks? Choose all that apply.
Escape dynamic content when it is written out in HTML.
Ask the user to disable JavaScript in their browser.
Obfuscate your JavaScript.
Whitelist permitted values for dynamic fields.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How could an attacker exploit a command execution vulnerability?
Set up a fake website that looks like your site on a copycat domain.
Summoning evil spirits and placing a curse on your database.
Installing malicious code and making your server part of a botnet.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tag is typically used in a clickjacking attack to wrap another site?
<script>
<iframe>
<center>
<blink>
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of anti-forgery tokens?
Validating that a request is generated by a page that is connected to the same website.
Validating a password.
Validating a credit card number the user has entered.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following methods can circumvent directory traversal vulnerabilities? Choose all that apply.
Keep static documents on a separate file system from your executable code.
Making users change their password frequently.
Storing documents in a content management system.
Hiring private security guards to grimace at anyone approaching your servers.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?