Search Header Logo

Cybersecurity Final Review FALL24

Authored by Kaitlin Hoffmann

Computers

University

Used 20+ times

Cybersecurity Final Review FALL24
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is SQL Injection?

A method for improving database performance

A vulnerability where users inject malicious code into SQL statements

A process for automatically updating database tables

A technique for encrypting database queries

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a Next-Generation Firewall (NGFW) enhance security compared to first-generation firewalls?

By using stateless rules

By focusing solely on individual packets

By performing deep-packet inspection and application-level analysis

By blocking all outgoing traffic by default

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key feature of prepared statements in SQL?

They merge code and data for faster processing

They parse and execute SQL statements without optimization

They separate data and code to prevent injection attacks

They allow unrestricted user input for dynamic queries

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the vulnerability in the following code?

e.preventDefault()

innerHTML

document.getElementById()

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between HTTP and HTTPS?

  • HTTPS is encrypted and secured using digital certificates, while HTTP is not

  • HTTP is encrypted and secured using digital certificates, while HTTPS is not

There is no difference between the two

HTTPS sends POST requests only while HTTP only sends GET requests

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are stateful mechanisms? (Answer may be more than one)

cookies

session

localStorage

donuts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Nmap?

To encrypt network traffic

To monitor email communications

To replace firewalls in network security

To scan and analyze networks for hosts and services

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?