Hacking & Web Application (Week.12)

Hacking & Web Application (Week.12)

University

13 Qs

quiz-placeholder

Similar activities

1.1.1 The structure and function of the processor

1.1.1 The structure and function of the processor

11th Grade - University

15 Qs

CIS2303 Week 4_5 Ch_3

CIS2303 Week 4_5 Ch_3

University

18 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

ITF Chapter 1 Computing Devices

ITF Chapter 1 Computing Devices

University

14 Qs

U3BigData01

U3BigData01

University

18 Qs

Let's Play Together

Let's Play Together

University - Professional Development

10 Qs

Machine Learning (Introduction)

Machine Learning (Introduction)

University

10 Qs

Determining System Requirements

Determining System Requirements

University

11 Qs

Hacking & Web Application (Week.12)

Hacking & Web Application (Week.12)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Hardiansyah Hardiansyah

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Web Application is running on protocol ?

UDP

HTTP/HTTPS

TCP/IP

FTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What we have to use to store the data at the client side (browser) ?

Cookies

Sessions

Server

Database

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What we have to use to store the data at the SERVER side ?

Cookies

Server

Sessions

Browser

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We can use this tool to sniffing the data within the network.

Jira

Wireshark

  • John the Ripper

SQLMap

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For SQL Injection attack, we can use this tool.

John the Ripper

SQL Map

Xcode

Kotlin

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To attack the website by guessing username and password using brute force technique, we can use this tool

SQL Map

John The Ripper

Metasploit

Wireshark

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of these is NOT hacking attack.

Sniffing

Information Gathering

Brute Force

Scanning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?