
Understanding Cybersecurity Threats
Authored by Victoria Price
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a brute force attack?
Inserting malicious SQL code into a database query.
Trying all possible combinations of passwords, keys, etc.
Injecting malicious scripts into web pages.
Overwriting memory locations with malicious data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves inserting malicious SQL code into a database query?
Cross-Site Scripting (XSS)
SQL injection
Buffer overflow
Directory traversal
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Cross-Site Scripting (XSS)?
Making malicious requests on behalf of a user.
Executing arbitrary code on a remote system.
Injecting malicious scripts into web pages viewed by other users.
Interception and manipulation of network communications.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves making malicious requests on behalf of a user without their knowledge?
Cross-Site Request Forgery (CSRF)
Man-in-the-middle (MitM) attacks
Denial of Service (DoS)
Social engineering
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a buffer overflow?
Overwriting memory locations with malicious data to exploit vulnerabilities.
Attempting to access restricted files or directories.
Overwhelming a system with traffic.
Manipulating individuals into divulging confidential information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves executing arbitrary code on a remote system?
Directory traversal
Remote Code Execution (RCE)
Cross-Site Scripting (XSS)
SQL injection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is directory traversal?
Interception and manipulation of network communications.
Attempting to access restricted files or directories on a system.
Making malicious requests on behalf of a user.
Overwriting memory locations with malicious data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
🔦 Formative Assessment 2: Flow Controls
Quiz
•
12th Grade
20 questions
Unit-1 Computational Thinking
Quiz
•
9th - 12th Grade
20 questions
Quiz ASJ
Quiz
•
12th Grade
12 questions
Wee Word Intro
Quiz
•
7th - 12th Grade
17 questions
Quiz 01 Keamanan Jaringan
Quiz
•
12th Grade
13 questions
Five Nights At Freddy's: Security Breach Quiz
Quiz
•
KG - Professional Dev...
10 questions
Internet Technologies
Quiz
•
12th Grade
10 questions
If-Statements
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
14 questions
Making Inferences From Samples
Quiz
•
7th - 12th Grade
23 questions
CCG - CH8 Polygon angles and area Review
Quiz
•
9th - 12th Grade
8 questions
Momentum and Collisions
Lesson
•
9th - 12th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade