Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

quiz-placeholder

Similar activities

Week #7 - Risk Management

Week #7 - Risk Management

University

12 Qs

Topic 7 CFD1313

Topic 7 CFD1313

University

20 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

Program Security

Program Security

University

20 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

Vulnerability Research and Tools

Vulnerability Research and Tools

Assessment

Quiz

Computers

University

Hard

Created by

Aidora Abdullah

Used 22+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An example of an exploit is malware.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a security researcher usually submit to a vendor as evidence that an attack using a vulnerability in the vendor's software is possible?

Vulnerability details

Malware

Proof-of-concept exploit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below does NOT belong to the list of metric groups used in CVSS?

Temporal metric group

Complexity metric group

Base metric group

Environmental metric group

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call an exploit if the vulnerability was exploited AFTER a patch was released?

N-day exploit or attack

0-day exploit

0-day vulnerability

Vulnerability

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are web-based exploitive behaviors?

Defacing websites

Domain Name Server (DNS) attacks

ARP poisoning

Employing malicious code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______________ is a type of HTTP exploit that is used by attackers to gain unauthorized access to restricted directories and files.

Cookie snooping

Command injection

Directory traversal

Log tampering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The diagram shows an example of a(n) __________________ attack.

buffer overflow

cross-site request forgery

SQL injection

cross-site scripting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?