YCEP Quiz

YCEP Quiz

9th - 12th Grade

7 Qs

quiz-placeholder

Similar activities

hardware and software(g3)

hardware and software(g3)

2nd - 10th Grade

10 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Network

Network

10th - 11th Grade

10 Qs

ZOOM QUIZ

ZOOM QUIZ

1st - 12th Grade

10 Qs

Python Basic Quiz

Python Basic Quiz

11th Grade - University

10 Qs

Interactive Media

Interactive Media

10th - 11th Grade

10 Qs

1.8 Open Source & Closed Source TRUE or FALSE

1.8 Open Source & Closed Source TRUE or FALSE

10th Grade

10 Qs

TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN

TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN

11th Grade

10 Qs

YCEP Quiz

YCEP Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Peter Liau

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a Vulnerability in CyberSecurity?

A weakness in a flaw in a computed system that does not weaken the software and hardware

A weakness in an information system

An exploit or trigger by a harmless source.

The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazards

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DevTool did we not cover?

Inspector

Network

Storage

Memory

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is not covered in Cross-Site scripting?

Non-Persistent XSS

Stored XSS

DOM-based XSS

Cross-site XSS

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

&aqs=avast..69i57j69i65f3j0l4.17668j0j1

:3008

#idjwique2108389247sadj

www.google.com/search?client=avast-a-1&q=Nullsec

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is not a method that we taught in the slides to stop WEB attacks?

Validation

  • - Compare the input against a whitelist of allowed values​

  • - Ensure that user input is not the only one supplying all parts of the path

Data Debugging​

  • - Replaces special characters so that they do not get interpreted as active content​

  • < becomes %3E in URLs

  • - storing information about a compiled computer program for use by high-level debuggers

  • - Did you confuse data encoding with data debugging?

Sanitisation

  • - Cleaning up user-provided inputs to prevent execution of unintended code through:​

  • - Escaping/Replacing characters (' → \')​

  • Removing characters or keywords

FireWalls

  • - Rule-based blocking (blocking unused SQL keywords)​

  • - Inspecting and intercepting suspicious requests​

  • - Rate-limit sources making too many attempts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Query for SQL Injection?

' OR 1 = 1 -- 

" OR "1" = "1"

' OR "1" = "1"

" OR 1 = 1 -- "

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is Correct?

wwwroot contains index.html, style.css and script.js

Absolute Path is represented using: ../../IdontKnow/NotAbsolute

Relative Path is represented using: ../../IdontKnow/NotAbsolute

Distinct path is represented using: /dirB/IamnotAbsolute