PS hack

PS hack

University

20 Qs

quiz-placeholder

Similar activities

Cell Structure and Function Quiz

Cell Structure and Function Quiz

12th Grade - University

15 Qs

Variable

Variable

6th Grade - University

15 Qs

Constellation Challenge

Constellation Challenge

5th Grade - University

15 Qs

A Physical Change Causes the Properties to Change

A Physical Change Causes the Properties to Change

5th Grade - University

15 Qs

Acids and Bases Test

Acids and Bases Test

7th Grade - University

15 Qs

Cladogram Lesson

Cladogram Lesson

9th Grade - University

15 Qs

PBFP_Pure Substance Or Mixture?

PBFP_Pure Substance Or Mixture?

University

15 Qs

WATER SUPPLY

WATER SUPPLY

University

15 Qs

PS hack

PS hack

Assessment

Quiz

Science

University

Practice Problem

Easy

Created by

Mircea Preoteasa

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following algorithm can be used by PGP for signing:

RC5 (Rivest Cipher 5)

RSA (Rivest–Shamir–Adleman)

AES (Advanced Encryption Standard)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following vector attacks are specific for HTTP/2?

CRIME (Compression Ratio Info-leak Made Easy) (attack)

Dependency cycle (attack)

Quick read (attack)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Consider the following example of an RRSIG record:

abcd.org 200 RRSIG A 13 20 200 (20210115123401 20190215123401 209 abcd.org. ) 

How large is the RRset that is signed by this RRSIG record?

100

20

13

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the attack that is not a DoS:

Smurf Attack

  1. Finger Bomb

DNS Cache Poisoning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What type of XSS attack doesn’t require the attacker to directly interact with the target?

Reflected

Persistent

  1. DOM-based

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of the following vector attacks is specific for HTTP/2?

Eclipse

  1. Slow read

  1. BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the effect of an XSS attack?

  1. Allows an attacker to include remote code that is executed locally on the web-server

  1. Malicious scripts are injected into trusted websites

  1. Unauthorized commands are transmitted from a user that the web application trusts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Science