IAW301 Fun Fun

IAW301 Fun Fun

University

•

30 Qs

quiz-placeholder

Similar activities

Cyber Security Quiz

Cyber Security Quiz

University

•

25 Qs

EGZAMIN POTWIERDZAJĄCY KWALIFIKACJE W ZAWODZIE Rok 2021_czerwiec

EGZAMIN POTWIERDZAJĄCY KWALIFIKACJE W ZAWODZIE Rok 2021_czerwiec

12th Grade - University

•

25 Qs

Round 2

Round 2

University

•

25 Qs

Keamanan Jaringan dan Firewall

Keamanan Jaringan dan Firewall

University

•

25 Qs

CCC19 - Chapter 6 - Internet and WWW

CCC19 - Chapter 6 - Internet and WWW

University

•

25 Qs

Framework Web

Framework Web

University

•

25 Qs

NETWORK SECURITY

NETWORK SECURITY

University

•

25 Qs

GDSC FET Jain University Study Jam 106

GDSC FET Jain University Study Jam 106

University

•

25 Qs

IAW301 Fun Fun

IAW301 Fun Fun

Assessment

Quiz

•

Computers

•

University

•

Practice Problem

•

Easy

Created by

Zhong China

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their own.

Backdoor Shell

Reverse Shell

Code Shell

Bind Shell

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common form of SQLi which evade the login form

Logic Bypass

Authentication Bypass

Authorization Bypass

Login Bypass

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you tell the parser that a speciffic character is a literal and not a control character?

URL Encode

Whitelist

Blacklist

Escaping

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following languages is the primary target of cross-site scripting?

C/C++

HTML

Javascript

CSS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Metasploit's payload can be used to connect to NetCat listener on vulnerable server ?

linux/x86/adduser

linux/x86/readfile

linux/x86/shell/bind_tcp

None of others

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you to prevent SQL Injection?

Filtering

Prepared Statements

Escaping

URL Encoding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ is possible when an attacker uses a vulnerable website or web application to inject malicious code which is stored and later automatically served to other users who visit the web page.

Reflected XSS

Stored XSS

DOM XSS

None of others

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?