YCEP Quiz

YCEP Quiz

9th - 12th Grade

7 Qs

quiz-placeholder

Similar activities

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

Software Recon

Software Recon

5th - 10th Grade

11 Qs

INTERNET LOGO GAME

INTERNET LOGO GAME

7th Grade - Professional Development

10 Qs

T-Level DPDD: Built-In Functions Quiz

T-Level DPDD: Built-In Functions Quiz

11th Grade

12 Qs

Tipos de sistemas operativos

Tipos de sistemas operativos

10th Grade

10 Qs

Информационная безопасность

Информационная безопасность

11th Grade

10 Qs

AVAST

AVAST

KG - University

10 Qs

Cybersecurity Quiz: 5.17 Labs

Cybersecurity Quiz: 5.17 Labs

11th Grade

10 Qs

YCEP Quiz

YCEP Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Peter Liau

Used 6+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a Vulnerability in CyberSecurity?

A weakness in a flaw in a computed system that does not weaken the software and hardware

A weakness in an information system

An exploit or trigger by a harmless source.

The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazards

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DevTool did we not cover?

Inspector

Network

Storage

Memory

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is not covered in Cross-Site scripting?

Non-Persistent XSS

Stored XSS

DOM-based XSS

Cross-site XSS

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

&aqs=avast..69i57j69i65f3j0l4.17668j0j1

:3008

#idjwique2108389247sadj

www.google.com/search?client=avast-a-1&q=Nullsec

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is not a method that we taught in the slides to stop WEB attacks?

Validation

  • - Compare the input against a whitelist of allowed values​

  • - Ensure that user input is not the only one supplying all parts of the path

Data Debugging​

  • - Replaces special characters so that they do not get interpreted as active content​

  • < becomes %3E in URLs

  • - storing information about a compiled computer program for use by high-level debuggers

  • - Did you confuse data encoding with data debugging?

Sanitisation

  • - Cleaning up user-provided inputs to prevent execution of unintended code through:​

  • - Escaping/Replacing characters (' → \')​

  • Removing characters or keywords

FireWalls

  • - Rule-based blocking (blocking unused SQL keywords)​

  • - Inspecting and intercepting suspicious requests​

  • - Rate-limit sources making too many attempts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Query for SQL Injection?

' OR 1 = 1 -- 

" OR "1" = "1"

' OR "1" = "1"

" OR 1 = 1 -- "

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is Correct?

wwwroot contains index.html, style.css and script.js

Absolute Path is represented using: ../../IdontKnow/NotAbsolute

Relative Path is represented using: ../../IdontKnow/NotAbsolute

Distinct path is represented using: /dirB/IamnotAbsolute