IAW301 Fun Fun

IAW301 Fun Fun

University

•

30 Qs

quiz-placeholder

Similar activities

Value Added Course_NoSQL Databases

Value Added Course_NoSQL Databases

University

•

25 Qs

The GCCP Quiz

The GCCP Quiz

University

•

25 Qs

Practice Questions DP 300

Practice Questions DP 300

University

•

25 Qs

OCR J277 GCSE Paper 1 Recap

OCR J277 GCSE Paper 1 Recap

9th Grade - University

•

35 Qs

Kuis Internet1 L2324

Kuis Internet1 L2324

University

•

25 Qs

Latihan 3 - Cloud Computing - 2TRKA

Latihan 3 - Cloud Computing - 2TRKA

University

•

25 Qs

Quiz on Operating System Basics

Quiz on Operating System Basics

University

•

25 Qs

Cyber Security Activity - 1

Cyber Security Activity - 1

University

•

25 Qs

IAW301 Fun Fun

IAW301 Fun Fun

Assessment

Quiz

•

Computers

•

University

•

Practice Problem

•

Easy

Created by

Zhong China

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their own.

Backdoor Shell

Reverse Shell

Code Shell

Bind Shell

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common form of SQLi which evade the login form

Logic Bypass

Authentication Bypass

Authorization Bypass

Login Bypass

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you tell the parser that a speciffic character is a literal and not a control character?

URL Encode

Whitelist

Blacklist

Escaping

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following languages is the primary target of cross-site scripting?

C/C++

HTML

Javascript

CSS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Metasploit's payload can be used to connect to NetCat listener on vulnerable server ?

linux/x86/adduser

linux/x86/readfile

linux/x86/shell/bind_tcp

None of others

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you to prevent SQL Injection?

Filtering

Prepared Statements

Escaping

URL Encoding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ is possible when an attacker uses a vulnerable website or web application to inject malicious code which is stored and later automatically served to other users who visit the web page.

Reflected XSS

Stored XSS

DOM XSS

None of others

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?