PS hack

PS hack

University

20 Qs

quiz-placeholder

Similar activities

Intro to Microbiology

Intro to Microbiology

University

15 Qs

Cause of Death

Cause of Death

10th Grade - University

15 Qs

Circulatory System practice

Circulatory System practice

6th Grade - University

20 Qs

Adaptation

Adaptation

5th Grade - University

15 Qs

Telecommunications, Internet and Networks

Telecommunications, Internet and Networks

University

20 Qs

Chapter 1 & 2 Test

Chapter 1 & 2 Test

University

20 Qs

Phlebotomy

Phlebotomy

University

17 Qs

WMI

WMI

1st Grade - University

15 Qs

PS hack

PS hack

Assessment

Quiz

Science

University

Easy

Created by

Mircea Preoteasa

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following algorithm can be used by PGP for signing:

RC5 (Rivest Cipher 5)

RSA (Rivest–Shamir–Adleman)

AES (Advanced Encryption Standard)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following vector attacks are specific for HTTP/2?

CRIME (Compression Ratio Info-leak Made Easy) (attack)

Dependency cycle (attack)

Quick read (attack)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Consider the following example of an RRSIG record:

abcd.org 200 RRSIG A 13 20 200 (20210115123401 20190215123401 209 abcd.org. ) 

How large is the RRset that is signed by this RRSIG record?

100

20

13

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the attack that is not a DoS:

Smurf Attack

  1. Finger Bomb

DNS Cache Poisoning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What type of XSS attack doesn’t require the attacker to directly interact with the target?

Reflected

Persistent

  1. DOM-based

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following vector attacks is specific for HTTP/2?

Eclipse

  1. Slow read

  1. BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the effect of an XSS attack?

  1. Allows an attacker to include remote code that is executed locally on the web-server

  1. Malicious scripts are injected into trusted websites

  1. Unauthorized commands are transmitted from a user that the web application trusts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?