Happy hour Week 30

Happy hour Week 30

KG

10 Qs

quiz-placeholder

Similar activities

Pre & Post Tes TQM

Pre & Post Tes TQM

Professional Development

10 Qs

Social Media & Education

Social Media & Education

Professional Development

10 Qs

Aprendeu ou disfarçou?

Aprendeu ou disfarçou?

12th Grade - Professional Development

10 Qs

05.11.2019 - Quiz nr 3

05.11.2019 - Quiz nr 3

University

12 Qs

Pesos y medidas

Pesos y medidas

University

10 Qs

IHT TRIASE IGD RS.ERBA

IHT TRIASE IGD RS.ERBA

Professional Development

12 Qs

Breathing Patterns

Breathing Patterns

University - Professional Development

12 Qs

Cougar Den Session Type Review

Cougar Den Session Type Review

6th - 8th Grade

7 Qs

Happy hour Week 30

Happy hour Week 30

Assessment

Quiz

Professional Development

KG

Practice Problem

Medium

Created by

Checkmarx Rocha

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is needed to succeed in a Prototype Pollution attack?

only to "override" a __proto__ property or method

only need to call on a gadget

only to pollute a property or method and have a gadget to call it

only HTML injection allows Prototype pollution

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following payloads allows to check for HTML Injection?

<script>alert()</script>

<b>test</b>

<img src="something" onerror="do()">

' AND 1=1'

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Does STRUTS prevent CSRF?

YES

NO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are 3rd party libs excluded from CxSAST analysis ?

Those are scanned by Composition Analysis

Those are manually analysed by AppSec Research

Those are not excluded

KICS scans those

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is KICS?

keeping infrastructure as code scanner

keeping intelligent code secure

keeping infrastructure as code safe

keeping infrastructure as code secure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is parameter tampering?

a program inadvertently exposes sensitive information provided without proper encryption or protection.

an attacker alters input parameters to bypass controls or gain unauthorized access to a system or application.

an exception raised during an operation is not properly handled, causing the program to terminate abruptly with an error message.

an application fails to properly handle and restrict XML input containing external entities, potentially leading to information disclosure.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Prompt Engineering?

the physical construction or design of engineering prompts for user mechanical devices.

the process of designing instructions given during a CICD pipeline to achieve quality standards.

is the overall impression and satisfaction a person gains from interacting with a product, service, or system, encompassing aspects like usability, accessibility, and emotional response.

the process of designing and optimizing prompts for natural language processing models to enhance their performance and generate more accurate responses.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?