Search Header Logo

Vulnerability Research and Tools

Authored by Aidora Abdullah

Computers

University

Used 23+ times

Vulnerability Research and Tools
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An example of an exploit is malware.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a security researcher usually submit to a vendor as evidence that an attack using a vulnerability in the vendor's software is possible?

Vulnerability details

Malware

Proof-of-concept exploit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below does NOT belong to the list of metric groups used in CVSS?

Temporal metric group

Complexity metric group

Base metric group

Environmental metric group

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call an exploit if the vulnerability was exploited AFTER a patch was released?

N-day exploit or attack

0-day exploit

0-day vulnerability

Vulnerability

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are web-based exploitive behaviors?

Defacing websites

Domain Name Server (DNS) attacks

ARP poisoning

Employing malicious code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______________ is a type of HTTP exploit that is used by attackers to gain unauthorized access to restricted directories and files.

Cookie snooping

Command injection

Directory traversal

Log tampering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The diagram shows an example of a(n) __________________ attack.

buffer overflow

cross-site request forgery

SQL injection

cross-site scripting

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?