Cybersecurity Unit 2.3 Review

Cybersecurity Unit 2.3 Review

11th Grade

25 Qs

quiz-placeholder

Similar activities

2.2.1 Cyber More on Malware

2.2.1 Cyber More on Malware

9th - 12th Grade

27 Qs

ADMINISTRASI SISTEM JARINGAN

ADMINISTRASI SISTEM JARINGAN

11th Grade

20 Qs

Kemungkinan Ancaman dan Serangan terhadap Keamanan Jaringan

Kemungkinan Ancaman dan Serangan terhadap Keamanan Jaringan

11th Grade

20 Qs

Blown to Bits Chapter 2 Vocab

Blown to Bits Chapter 2 Vocab

9th - 12th Grade

22 Qs

Advanced CyberCamp Day 1 & 2 Review

Advanced CyberCamp Day 1 & 2 Review

KG - Professional Development

20 Qs

IT Essentials Chapter 12-13 Exam Study Guide

IT Essentials Chapter 12-13 Exam Study Guide

11th Grade

25 Qs

AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

11th - 12th Grade

21 Qs

Networking Ch 8 Quiz Review

Networking Ch 8 Quiz Review

9th - 12th Grade

20 Qs

Cybersecurity Unit 2.3 Review

Cybersecurity Unit 2.3 Review

Assessment

Quiz

Computers

11th Grade

Easy

Created by

LARRY GREEN

Used 5+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where do most exploits occur?

On secure servers

In vulnerable software

In encrypted data

On user devices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Know the functions of each of the following: HTML, CSS, XML

Data structuring and presentation

Data encryption

Network configuration

Hardware management

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To complete the XSS exploit, where do you type in the script?

In the server logs

In the user input fields

In the database

In the network settings

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a cross-scripting exploit change a web page?

By altering the server code

By modifying the database schema

By injecting malicious scripts

By changing the network protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do each of the SQL injections work? SELECT, MERGE, UNION

By combining data from multiple tables

By encrypting data

By deleting data

By creating new tables

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How could security professionals guard against SQL injections?

Use parameterized queries

Disable all database access

Use plain text passwords

Allow all user inputs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are different ways a hacker could exploit a website using a SQL injection?

Retrieve hidden data

Increase website speed

Improve user interface

Enhance security features

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?