Search Header Logo

LINKS Cyber Youth Challenge - Round 2

Authored by Imane Benkhelifa

Other

University

Used 2+ times

LINKS Cyber Youth Challenge - Round 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which port does HTTPS use by default?

21

80

443

22

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What tool is commonly used for network sniffing?

Wireshark

Notepad

GitHub

Zoom

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A SQL Injection attack targets which component?

Browser cookies

Database query

System kernel

Network traffic

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the main goal of a buffer overflow attack?

Fill up disk space

Corrupt user data

Execute arbitrary code

Reset the system clock

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What command is used in Linux to change file permissions?

chmod

chpass

chperm

passmod

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which protocol is vulnerable to packet sniffing if unencrypted?

HTTPS

SFTP

HTTP

SSH

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which header protects against clickjacking attacks?

X-Content-Type-Options

Content-Security-Policy

X-Frame-Options

Strict-Transport-Security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?