
LINKS Cyber Youth Challenge - Round 2
Authored by Imane Benkhelifa
Other
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which port does HTTPS use by default?
21
80
443
22
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What tool is commonly used for network sniffing?
Wireshark
Notepad
GitHub
Zoom
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A SQL Injection attack targets which component?
Browser cookies
Database query
System kernel
Network traffic
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the main goal of a buffer overflow attack?
Fill up disk space
Corrupt user data
Execute arbitrary code
Reset the system clock
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What command is used in Linux to change file permissions?
chmod
chpass
chperm
passmod
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which protocol is vulnerable to packet sniffing if unencrypted?
HTTPS
SFTP
HTTP
SSH
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which header protects against clickjacking attacks?
X-Content-Type-Options
Content-Security-Policy
X-Frame-Options
Strict-Transport-Security
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?