CyberSecurity Unit 7

CyberSecurity Unit 7

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

IV. Database

IV. Database

KG - 12th Grade

10 Qs

Control Panel Hosting

Control Panel Hosting

12th Grade

20 Qs

SQL Basics

SQL Basics

12th Grade

10 Qs

PERSIAPAN SAS BASIS DATA

PERSIAPAN SAS BASIS DATA

11th Grade

20 Qs

Perekrutan Asisten APSI

Perekrutan Asisten APSI

1st - 11th Grade

20 Qs

DDL DML DCL TCL

DDL DML DCL TCL

12th Grade

20 Qs

Fingerprints

Fingerprints

6th - 9th Grade

15 Qs

Asesessman Akir kd. 3.11 share hosting

Asesessman Akir kd. 3.11 share hosting

12th Grade - University

20 Qs

CyberSecurity Unit 7

CyberSecurity Unit 7

Assessment

Quiz

Other

9th - 12th Grade

Medium

Created by

WILLIAM BELIVEAU

Used 17+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Client-server applications

A. are any apps that run on personal devices and need access to resources from a server. B. are distributed resources across multiple apps or devices. C. provide services such as data sharing and web pages. D. include database, file, mail, print, web, and game servers E. are also known as front-end and back-end applications.

All options are correct

B and E

All options except D

A, C, and D

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The SQL query:

SELECT name, id FROM Employee;

will return

the name and id columns, in that order.

the Employee table.

the id and name columns, in that order.

nothing because the SQL syntax is incorrect.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens during a SQLi attack?

A. A malicious actor uses SQL to get the database to reveal its contents. B. Nothing happens as this is an old form of attack and no longer relevant because of newer cybersecurity protocols. C. Malicious SQL statements are placed somewhere within a web page or application’s input or URL. D. Hackers can gain access to sensitive data, such as PII, credit card information, and login credentials. E. This is considered a low-level attack and not destructive on a large scale so typically the most an attacker can do is render web pages differently to an end user.

All options are correct.

B only

D only

A, C, and D

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Some of the best ways to prevent or at least mitigate a SQLi attack are to

A. Keep data separate from commands and queries B. Use a safe API C. Reduce the amount of SQL used overall D. Use server-side input validation E. Use other SQL controls to prevent mass disclosure of records F. Avoid leaving any raw SQL in the code G. Have SQL reside behind multiple layers in the code base and not accessible by the site

C, E, F, and G

A, B, and D

A, B, C, and D

All options are correct.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using view page source allows you to quickly see the following:

A. The HTML that marks up the page B. Images used and their location in a site folder C. Fonts and icons D. Stylesheets E. Server-side scripts that bring in information from a database, such as search engines, forums, etc. F. JavaScript within a <script> element G. JavaScript outside of a <script> element

All options are correct.

A, B, C and D

A, B, C, D, and F

All except E

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Developer tools can help with

A. Testing and debugging a site or web app. B. Diagnosing problems quickly on a site or web app. C. Building and maintaining a more secure site or web app. D. Modifying site or web app elements and sending the changes back to the server. E. Changing code in real-time to see how it impacts the site or web app on the fly.

All except D.

A, B, and C

D only

All options are correct.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A database is always comprised of

personally identifying information.

tables with rows and columns.

lots of cryptographically stored symbols.

lots of little databases.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?