WAPT 2 - Up to API

WAPT 2 - Up to API

12th Grade

50 Qs

quiz-placeholder

Similar activities

kuis  Jaringan Internet

kuis Jaringan Internet

9th Grade - University

50 Qs

basis data

basis data

12th Grade

55 Qs

Операционные системы и командная строка

Операционные системы и командная строка

12th Grade

54 Qs

Databricks Certified Data Engineer Quiz part 2

Databricks Certified Data Engineer Quiz part 2

1st Grade - University

50 Qs

SQL Connection with Python by Aditya Singh

SQL Connection with Python by Aditya Singh

12th Grade

50 Qs

0478 - Chap 2

0478 - Chap 2

9th - 12th Grade

46 Qs

Computer Science Unit 1 Glossary

Computer Science Unit 1 Glossary

10th - 12th Grade

46 Qs

Year 12 Summative Review - Nov 2022

Year 12 Summative Review - Nov 2022

12th Grade - University

50 Qs

WAPT 2 - Up to API

WAPT 2 - Up to API

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Nafish Alam

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following SQL injection types uses the same communication channel to retrieve data?

Blind SQL Injection

In-band SQL Injection

Out-of-Band SQL Injection

Error-Based SQL Injection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which payload will exploit an In-band SQL injection in a login form?

' OR '1'='1; --

alert(1)

' AND 1=2; --

../etc/passwd

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You intercept the following query: SELECT * FROM users WHERE username = '$user' AND password = '$pass'; What payload can you use to bypass authentication using In-band SQL injection?

' OR '1'='1; --

'; DROP TABLE users;

../etc/passwd

alert('Hack')

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique can be used to test for Blind SQL injection?

Boolean-based testing

Error-based testing

Time-based testing

Code injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the payload 1 AND 1=1 returns a result while 1 AND 1=2 does not, what does it indicate?

The application is vulnerable to Time-based SQL injection

The application is vulnerable to Boolean-based Blind SQL injection

The application is secure

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You send the payload: ' AND SLEEP(5); -- The response takes 5 seconds to load. What does this confirm?

Boolean-based Blind SQL injection

Error-based SQL injection

Time-based Blind SQL injection

Reflected XSS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of Blind SQL injection is being tested when no error is returned, but delays occur?

Boolean-based

Time-based

In-band

Error-based

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?