How Much You Really Know About Hacking? Trivia Quiz

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Alexandrupetroai
A
Alexandrupetroai
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,084
| Attempts: 3,084 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. What is SQL Injection?

Explanation

An SQL query is a request for some action to be performed on a database. Typically, on a Web form for user authentication, when a user enters their name and password into the text boxes provided for them, those values are inserted into a SELECT query. If the values entered are found as expected, the user is allowed access; if they aren't found, access is denied. However, most Web forms have no mechanisms in place to block input other than names and passwords. Unless such precautions are taken, an attacker can use the input boxes to send their own request to the database, which could allow them to download the entire database or interact with it in other illicit ways.

Submit
Please wait...
About This Quiz
How Much You Really Know About Hacking? Trivia Quiz - Quiz

How much you know about hacking? There are different ways that people can get access to other people’s personal information through the internet, and if caught, the offenders may spend years in jail. This is a short educational questionnaire that aims to reveal to you a few techniques used by... see morehackers and help you protect your code from being hacked. Check it out! see less

Personalize your quiz and earn a certificate with your name on it!
2. What is a "white hat" hacker?

Explanation

The term "white hat" in Internet slang refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[1] Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing.

Submit
3. What is a spoofing attack?

Explanation

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

Submit
4. What is a packet sniffer?

Explanation

A packet analyzer (also known as a network analyzer, protocol analyzer, or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network.[1] As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.

Submit
5. How can SQL Injection be prevented?

Explanation

The best way is to carefully sanitize user input. Any data received from a user should be considered unsafe.

Submit
6. What is Social Engineering?

Explanation

Social engineering is commonly understood to mean the art of manipulating people into performing actions or divulging confidential information.[1] The people who need to hide their crimes say it is similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the global criminals/victims.

Submit
7. What is Password cracking?

Explanation

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Another common approach is to say that you have "forgotten" the password and then changing it. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords.

Submit
8. What is Cross-site scripting?

Explanation

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy. Cross-site scripting carried out on websites accounted for roughly 80.5% of all security vulnerabilities documented by Symantec as of 2007.

Submit
9. What is a security exploit?

Explanation

A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross-Site Scripting and Cross-Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.

Submit
10. What is a rootkit?

Explanation

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 07, 2011
    Quiz Created by
    Alexandrupetroai
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is SQL Injection?
What is a "white hat" hacker?
What is a spoofing attack?
What is a packet sniffer?
How can SQL Injection be prevented?
What is Social Engineering?
What is Password cracking?
What is Cross-site scripting?
What is a security exploit?
What is a rootkit?
Alert!

Advertisement