
Vulnerability Website
Authored by Pongsathon Sirithanyakul
Special Education
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a common payload used for testing SQL Injection vulnerabilities?
'; DROP TABLE users; -
<script>alert('SQL Injection');</script>
%27%20OR%201%3D1%20--
SELECT * FROM users WHERE username = 'admin' AND password = 'password'
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best describes OS command injection?
A method used to inject malicious code into a website's database
A vulnerability that allows attackers to execute arbitrary commands on a server's operating system
A technique for bypassing firewalls to gain unauthorized access to a network
A security measure implemented to prevent buffer overflow attacks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which file extensions pose potential risks if uploaded by users?
.exe, .php, .bat
.jpg, .png, .gif
.txt, .pdf, .docx
.html, .css, .js
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is not a protection against a brute force password attack?
Implementing account lockout policies after a certain number of failed login attempts
Using strong and complex passwords that are difficult to guess
Employing multi-factor authentication to add an extra layer of security
Regularly updating and patching software to address potential vulnerabilities
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a possible consequence of Cross-Site Scripting (XSS) attacks?
Alteration of server-side database entries.
Compromise of system files on the server.
Elevation of user privileges within the application.
Execution of malicious scripts within the victim's browser.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a potential risk associated with weak session IDs in web applications?
Allowing attackers to execute arbitrary code on the server.
Facilitating cross-site scripting (XSS) attacks.
Enabling session hijacking and unauthorized access to user accounts.
All correct.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a characteristic of a race condition attack in computer security?
Exploiting vulnerabilities in cryptographic algorithms.
Manipulating timing or sequence of events to gain unauthorized access.
Generating excessive network traffic to overwhelm system resources.
Intercepting and decrypting encrypted communication between two parties.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Special Education
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development