YCEP Quiz

YCEP Quiz

9th - 12th Grade

7 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

ICT Java programming workshop

ICT Java programming workshop

9th Grade

10 Qs

website design elements

website design elements

12th Grade

12 Qs

ICT as Social Change

ICT as Social Change

12th Grade

10 Qs

Coding helps to Understand

Coding helps to Understand

6th - 10th Grade

10 Qs

Packet Switching and Encryption

Packet Switching and Encryption

10th - 12th Grade

11 Qs

ICT Computer Basics pt1

ICT Computer Basics pt1

10th - 12th Grade

12 Qs

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

YCEP Quiz

YCEP Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Peter Liau

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a Vulnerability in CyberSecurity?

A weakness in a flaw in a computed system that does not weaken the software and hardware

A weakness in an information system

An exploit or trigger by a harmless source.

The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazards

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DevTool did we not cover?

Inspector

Network

Storage

Memory

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is not covered in Cross-Site scripting?

Non-Persistent XSS

Stored XSS

DOM-based XSS

Cross-site XSS

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

&aqs=avast..69i57j69i65f3j0l4.17668j0j1

:3008

#idjwique2108389247sadj

www.google.com/search?client=avast-a-1&q=Nullsec

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is not a method that we taught in the slides to stop WEB attacks?

Validation

  • - Compare the input against a whitelist of allowed values​

  • - Ensure that user input is not the only one supplying all parts of the path

Data Debugging​

  • - Replaces special characters so that they do not get interpreted as active content​

  • < becomes %3E in URLs

  • - storing information about a compiled computer program for use by high-level debuggers

  • - Did you confuse data encoding with data debugging?

Sanitisation

  • - Cleaning up user-provided inputs to prevent execution of unintended code through:​

  • - Escaping/Replacing characters (' → \')​

  • Removing characters or keywords

FireWalls

  • - Rule-based blocking (blocking unused SQL keywords)​

  • - Inspecting and intercepting suspicious requests​

  • - Rate-limit sources making too many attempts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Query for SQL Injection?

' OR 1 = 1 -- 

" OR "1" = "1"

' OR "1" = "1"

" OR 1 = 1 -- "

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is Correct?

wwwroot contains index.html, style.css and script.js

Absolute Path is represented using: ../../IdontKnow/NotAbsolute

Relative Path is represented using: ../../IdontKnow/NotAbsolute

Distinct path is represented using: /dirB/IamnotAbsolute