Web/System Exploitation

Web/System Exploitation

1st Grade - Professional Development

9 Qs

quiz-placeholder

Similar activities

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

University

9 Qs

Digital Knowledge Quiz

Digital Knowledge Quiz

University

10 Qs

Types of Websites and Recognizing Click Bait

Types of Websites and Recognizing Click Bait

4th - 7th Grade

13 Qs

Animal Rescue Websites Quiz 1

Animal Rescue Websites Quiz 1

7th Grade

10 Qs

Web Literacy Quiz

Web Literacy Quiz

6th - 8th Grade

10 Qs

Blog Growth

Blog Growth

University

11 Qs

Technical Terms - Internet (A-Z) - SEO

Technical Terms - Internet (A-Z) - SEO

12th Grade

10 Qs

Bisnis Daring Pt.1

Bisnis Daring Pt.1

11th Grade

10 Qs

Web/System Exploitation

Web/System Exploitation

Assessment

Quiz

Computers

1st Grade - Professional Development

Easy

Created by

Idiot I am

Used 6+ times

FREE Resource

9 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Media Image

The main web programming languages are HTML, JSS, CSS, and ___.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Exploiting vulnerable javascript is called what?

Backdooring

Cross-site scripting

Reconnaissance

Programming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Connecting to a website using unauthorized software planted in the website itself is called what?

Cross-site scripting

Malware

Web development

Backdooring

4.

MULTIPLE CHOICE QUESTION

20 sec • Ungraded

Media Image

If you found a vulnerability in a website, what would you do?

Contact the sysadmin that runs the site

Use the exploit to patch itself

Add that website to a list of vulnerable sites

It probably will be patched later...

Destruction!

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Write a short sentence about a vulnerable site you may have found.

Evaluate responses using AI:

OFF

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three types of hackers?

Orange hat

White hat

Purple hat

Black hat

Grey hat

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

ILOVEYOU was an e-mail ____.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the operating system with the least malware developed for it?

Windows

GNU/Linux

MacOS

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software disguises itself as another program to fool the user?

Trojan

Worm

Virus