IAW301 Fun Fun

IAW301 Fun Fun

University

30 Qs

quiz-placeholder

Similar activities

Application Development and Emerging Technologies Quiz 2

Application Development and Emerging Technologies Quiz 2

University

35 Qs

PHP dan MySQL

PHP dan MySQL

University

25 Qs

PHP + MySQL

PHP + MySQL

7th Grade - University

25 Qs

Praktek SO Redhat

Praktek SO Redhat

University

25 Qs

POST TEST 2 GAB 5  WEB APLIKASI CLENT SERVER

POST TEST 2 GAB 5 WEB APLIKASI CLENT SERVER

University

25 Qs

VIPS TECH X

VIPS TECH X

University

30 Qs

Sql Sınavı

Sql Sınavı

University

33 Qs

UAS Bahasa Pemrogrman II

UAS Bahasa Pemrogrman II

University

31 Qs

IAW301 Fun Fun

IAW301 Fun Fun

Assessment

Quiz

Computers

University

Easy

Created by

Zhong China

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their own.

Backdoor Shell

Reverse Shell

Code Shell

Bind Shell

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common form of SQLi which evade the login form

Logic Bypass

Authentication Bypass

Authorization Bypass

Login Bypass

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you tell the parser that a speciffic character is a literal and not a control character?

URL Encode

Whitelist

Blacklist

Escaping

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following languages is the primary target of cross-site scripting?

C/C++

HTML

Javascript

CSS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Metasploit's payload can be used to connect to NetCat listener on vulnerable server ?

linux/x86/adduser

linux/x86/readfile

linux/x86/shell/bind_tcp

None of others

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you to prevent SQL Injection?

Filtering

Prepared Statements

Escaping

URL Encoding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ is possible when an attacker uses a vulnerable website or web application to inject malicious code which is stored and later automatically served to other users who visit the web page.

Reflected XSS

Stored XSS

DOM XSS

None of others

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?