IAW301 Fun Fun

IAW301 Fun Fun

University

30 Qs

quiz-placeholder

Similar activities

Laravel Parcial #2

Laravel Parcial #2

University

28 Qs

SQL SERVER

SQL SERVER

University

30 Qs

GANJIL2025_UTS_XIRPL_REKAYASA PERANGKAT LUNAK

GANJIL2025_UTS_XIRPL_REKAYASA PERANGKAT LUNAK

11th Grade - University

35 Qs

Technical quiz

Technical quiz

University

25 Qs

UAS Big Data Analitik

UAS Big Data Analitik

University

25 Qs

IT 4112

IT 4112

University

30 Qs

Quiz Basis Data

Quiz Basis Data

University

25 Qs

UTS Bahasa Pemrogaman II Semester 4A , B & C

UTS Bahasa Pemrogaman II Semester 4A , B & C

University

25 Qs

IAW301 Fun Fun

IAW301 Fun Fun

Assessment

Quiz

Computers

University

Easy

Created by

Zhong China

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their own.

Backdoor Shell

Reverse Shell

Code Shell

Bind Shell

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common form of SQLi which evade the login form

Logic Bypass

Authentication Bypass

Authorization Bypass

Login Bypass

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you tell the parser that a speciffic character is a literal and not a control character?

URL Encode

Whitelist

Blacklist

Escaping

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following languages is the primary target of cross-site scripting?

C/C++

HTML

Javascript

CSS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Metasploit's payload can be used to connect to NetCat listener on vulnerable server ?

linux/x86/adduser

linux/x86/readfile

linux/x86/shell/bind_tcp

None of others

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique helps you to prevent SQL Injection?

Filtering

Prepared Statements

Escaping

URL Encoding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ is possible when an attacker uses a vulnerable website or web application to inject malicious code which is stored and later automatically served to other users who visit the web page.

Reflected XSS

Stored XSS

DOM XSS

None of others

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?