YCEP Quiz
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
Peter Liau
Used 6+ times
FREE Resource
Enhance your content in a minute
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is a Vulnerability in CyberSecurity?
A weakness in a flaw in a computed system that does not weaken the software and hardware
A weakness in an information system
An exploit or trigger by a harmless source.
The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazards
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which DevTool did we not cover?
Inspector
Network
Storage
Memory
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What is not covered in Cross-Site scripting?
Non-Persistent XSS
Stored XSS
DOM-based XSS
Cross-site XSS
4.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
In this link, which part is the fragment?
https://www.google.com/search?client=avast-a-1&q=Nullsec&oq=Nullsec&aqs=avast..69i57j69i65f3j0l4.17668j0j1&ie=UTF-8#idjwique2108389247sadj:3008
Note: This is not a real website
&aqs=avast..69i57j69i65f3j0l4.17668j0j1
:3008
#idjwique2108389247sadj
www.google.com/search?client=avast-a-1&q=Nullsec
5.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
What is not a method that we taught in the slides to stop WEB attacks?
Validation
- Compare the input against a whitelist of allowed values
- Ensure that user input is not the only one supplying all parts of the path
Data Debugging
- Replaces special characters so that they do not get interpreted as active content
< becomes %3E in URLs
- storing information about a compiled computer program for use by high-level debuggers
- Did you confuse data encoding with data debugging?
Sanitisation
- Cleaning up user-provided inputs to prevent execution of unintended code through:
- Escaping/Replacing characters (' → \')
Removing characters or keywords
FireWalls
- Rule-based blocking (blocking unused SQL keywords)
- Inspecting and intercepting suspicious requests
- Rate-limit sources making too many attempts
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the Query for SQL Injection?
' OR 1 = 1 --
" OR "1" = "1"
' OR "1" = "1"
" OR 1 = 1 -- "
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is Correct?
wwwroot contains index.html, style.css and script.js
Absolute Path is represented using: ../../IdontKnow/NotAbsolute
Relative Path is represented using: ../../IdontKnow/NotAbsolute
Distinct path is represented using: /dirB/IamnotAbsolute
Similar Resources on Wayground
10 questions
TỪ BÀI TOÁN ĐẾN CHƯƠNG TRÌNH
Quiz
•
11th Grade
11 questions
Email of request
Quiz
•
12th Grade - Professi...
10 questions
Recap: Introduction to Python
Quiz
•
10th Grade
10 questions
DL Refresher
Quiz
•
KG - Professional Dev...
10 questions
Star & Mesh Networks
Quiz
•
9th - 12th Grade
10 questions
Office 365
Quiz
•
12th Grade
10 questions
IT Quiz
Quiz
•
11th - 12th Grade
10 questions
PC1.8 Evaluate computer program
Quiz
•
9th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
