
Day 2 Quiz
Authored by Joseph Raymond V
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
....are incentives offered by companies to individuals who discover and report security vulnerabilities in their software or systems.
Bug Bounty Program
C Program
C++ Program
System Program
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The benefit of bug bounty program is...
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Offers a wide range of programs and tools for both companies and researchers called as
Bug Ranger
Bug Tool
Bug Search
Bug Crowd
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
European-based platform with a focus on ethical hacking and responsible disclosure..
EuropeHack
YesWeHack
ItalyHack
UKHack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
...is a malicious technique where a user is tricked into clicking on a hidden element on a legitimate website.
Hookinjection
Domainjacing
Clickjacking
Wildjacking
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users may be tricked into clicking on a "Like" button or a "Share" button that actually redirects them to a phishing page called as ...
Social Media Account Hijacking
Malicious Downloads
Unauthorized Transactions
Frame Ancestors Policy
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
...can be used to verify that a user is a human and not a bot.
CAPTCHA
GULCHA
BOTCHA
BASHA
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?