
Vulnerability Research and Tools
Authored by Aidora Abdullah
Computers
University
Used 23+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
An example of an exploit is malware.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a security researcher usually submit to a vendor as evidence that an attack using a vulnerability in the vendor's software is possible?
Vulnerability details
Malware
Proof-of-concept exploit
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the below does NOT belong to the list of metric groups used in CVSS?
Temporal metric group
Complexity metric group
Base metric group
Environmental metric group
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you call an exploit if the vulnerability was exploited AFTER a patch was released?
N-day exploit or attack
0-day exploit
0-day vulnerability
Vulnerability
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are web-based exploitive behaviors?
Defacing websites
Domain Name Server (DNS) attacks
ARP poisoning
Employing malicious code
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______________ is a type of HTTP exploit that is used by attackers to gain unauthorized access to restricted directories and files.
Cookie snooping
Command injection
Directory traversal
Log tampering
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The diagram shows an example of a(n) __________________ attack.
buffer overflow
cross-site request forgery
SQL injection
cross-site scripting
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?