Search Header Logo

POST-TEST DAY 2

Authored by Nurcholis Majid

Information Technology (IT)

Professional Development

10 Questions

Used 4+ times

POST-TEST DAY 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies belongs to the application layer and is used to generate dynamic web content?

PHP

Linux

MySQL

Apache

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following stores a server’s configuration, error, executable, and log files?

Web proxy

Server root

Document root

Virtual document tree

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which layer of the web application vulnerability stack does an attacker exploit business-logic flaws and technical vulnerabilities to perform input validation attacks such as XSS?

Layer 4

Layer 7

Layer 6

Layer 5

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which layer of the web-application vulnerability stack does an attacker scan an operating system to find open ports and vulnerabilities and develop viruses/backdoors to exploit them?

Layer 5

Layer 2

Layer 3

Layer 4

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks exploits vulnerabilities in dynamically generated webpages, which enables malicious attackers to inject client-side scripts into webpages viewed by other users?

Cross-site scripting

Security misconfiguration

Sensitive data exposure

Broken access control

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms is used to refer the technique that uses aggressive SEO tactics such as keyword stuffing, doorway pages, page swapping, and adding unrelated keywords to get higher search engine ranking for their malware pages?

Malvertising

Drive-by Downloads

Blackhat Search Engine Optimization (SEO)

Spear Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tina downloaded and installed a 3D screensaver. She is enjoying watching the 3D screensaver but whenever the screensaver gets activated, her computer is automatically scanning the network and sending the results to a different IP address on the network. Identify the malware installed along with the 3D screensaver?

Worm

Beacon

Trojan Horse

Virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?