Cybersecurity Unit 2.3 Review

Cybersecurity Unit 2.3 Review

11th Grade

25 Qs

quiz-placeholder

Similar activities

Security Fundamentals

Security Fundamentals

10th - 12th Grade

23 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Unit 4 Exam - Encryption - Cyber Security

Unit 4 Exam - Encryption - Cyber Security

9th - 12th Grade

20 Qs

Be Internet Awesome Part 1

Be Internet Awesome Part 1

6th - 12th Grade

21 Qs

Types of Database Security Controls

Types of Database Security Controls

11th Grade

20 Qs

security best practices

security best practices

10th Grade - University

20 Qs

Cisco Ch 9 Exam Review

Cisco Ch 9 Exam Review

9th Grade - University

21 Qs

Computer Systems and Computer Ethics

Computer Systems and Computer Ethics

8th - 12th Grade

25 Qs

Cybersecurity Unit 2.3 Review

Cybersecurity Unit 2.3 Review

Assessment

Quiz

Computers

11th Grade

Easy

Created by

LARRY GREEN

Used 5+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where do most exploits occur?

On secure servers

In vulnerable software

In encrypted data

On user devices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Know the functions of each of the following: HTML, CSS, XML

Data structuring and presentation

Data encryption

Network configuration

Hardware management

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To complete the XSS exploit, where do you type in the script?

In the server logs

In the user input fields

In the database

In the network settings

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a cross-scripting exploit change a web page?

By altering the server code

By modifying the database schema

By injecting malicious scripts

By changing the network protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do each of the SQL injections work? SELECT, MERGE, UNION

By combining data from multiple tables

By encrypting data

By deleting data

By creating new tables

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How could security professionals guard against SQL injections?

Use parameterized queries

Disable all database access

Use plain text passwords

Allow all user inputs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are different ways a hacker could exploit a website using a SQL injection?

Retrieve hidden data

Increase website speed

Improve user interface

Enhance security features

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers