Search Header Logo

YCEP Quiz

Authored by Peter Liau

Computers

9th - 12th Grade

Used 6+ times

YCEP Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a Vulnerability in CyberSecurity?

A weakness in a flaw in a computed system that does not weaken the software and hardware

A weakness in an information system

An exploit or trigger by a harmless source.

The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazards

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DevTool did we not cover?

Inspector

Network

Storage

Memory

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is not covered in Cross-Site scripting?

Non-Persistent XSS

Stored XSS

DOM-based XSS

Cross-site XSS

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

&aqs=avast..69i57j69i65f3j0l4.17668j0j1

:3008

#idjwique2108389247sadj

www.google.com/search?client=avast-a-1&q=Nullsec

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is not a method that we taught in the slides to stop WEB attacks?

Validation

  • - Compare the input against a whitelist of allowed values​

  • - Ensure that user input is not the only one supplying all parts of the path

Data Debugging​

  • - Replaces special characters so that they do not get interpreted as active content​

  • < becomes %3E in URLs

  • - storing information about a compiled computer program for use by high-level debuggers

  • - Did you confuse data encoding with data debugging?

Sanitisation

  • - Cleaning up user-provided inputs to prevent execution of unintended code through:​

  • - Escaping/Replacing characters (' → \')​

  • Removing characters or keywords

FireWalls

  • - Rule-based blocking (blocking unused SQL keywords)​

  • - Inspecting and intercepting suspicious requests​

  • - Rate-limit sources making too many attempts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Query for SQL Injection?

' OR 1 = 1 -- 

" OR "1" = "1"

' OR "1" = "1"

" OR 1 = 1 -- "

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is Correct?

wwwroot contains index.html, style.css and script.js

Absolute Path is represented using: ../../IdontKnow/NotAbsolute

Relative Path is represented using: ../../IdontKnow/NotAbsolute

Distinct path is represented using: /dirB/IamnotAbsolute

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?