
Understanding Cybersecurity Threats
Authored by Victoria Price
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a brute force attack?
Inserting malicious SQL code into a database query.
Trying all possible combinations of passwords, keys, etc.
Injecting malicious scripts into web pages.
Overwriting memory locations with malicious data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves inserting malicious SQL code into a database query?
Cross-Site Scripting (XSS)
SQL injection
Buffer overflow
Directory traversal
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Cross-Site Scripting (XSS)?
Making malicious requests on behalf of a user.
Executing arbitrary code on a remote system.
Injecting malicious scripts into web pages viewed by other users.
Interception and manipulation of network communications.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves making malicious requests on behalf of a user without their knowledge?
Cross-Site Request Forgery (CSRF)
Man-in-the-middle (MitM) attacks
Denial of Service (DoS)
Social engineering
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a buffer overflow?
Overwriting memory locations with malicious data to exploit vulnerabilities.
Attempting to access restricted files or directories.
Overwhelming a system with traffic.
Manipulating individuals into divulging confidential information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves executing arbitrary code on a remote system?
Directory traversal
Remote Code Execution (RCE)
Cross-Site Scripting (XSS)
SQL injection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is directory traversal?
Interception and manipulation of network communications.
Attempting to access restricted files or directories on a system.
Making malicious requests on behalf of a user.
Overwriting memory locations with malicious data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Quiz 01 Keamanan Jaringan
Quiz
•
12th Grade
10 questions
Tugas kelas XII RPL
Quiz
•
12th Grade
13 questions
Five Nights At Freddy's: Security Breach Quiz
Quiz
•
KG - Professional Dev...
10 questions
Internet Technologies
Quiz
•
12th Grade
10 questions
If-Statements
Quiz
•
9th - 12th Grade
10 questions
🔦 Formative Assessment 2: Flow Controls
Quiz
•
12th Grade
20 questions
Quiz ASJ
Quiz
•
12th Grade
12 questions
Wee Word Intro
Quiz
•
7th - 12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade