How much you know about hacking? There are different ways that people can get access to other people’s personal information through the internet, and if caught, the offenders may spend years in jail. This is a short educational questionnaire that aims to reveal to you a few techniques used by hackers and help you protect your code from being hacked. Check it out!
A prepared application that takes advantage of a known weakness
A way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
A module studied by most Computer Science students
A mobile internet solution
Rate this question:
A general purpose programming language
A type of security exploits in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data.
A prototype-based scripting language that is primarily used in the form of client-side JavaScript, implemented as part of a Web browser in order to provide enhanced user interfaces and dynamic websites.
An American quiz show featuring trivia in history, literature, the arts, pop culture, science, sports, geography, wordplay, and more.
Rate this question:
By sanitizing user input ( making sure that the user can't type anything else than what they are supposed to).
By not using SQL anymore
By making your code public
All of the above
Rate this question:
A secret word or string of characters that is used for authentication, to prove identity or gain access to a resource.
A term used to describe the penetration of a network, system, or resource with or without the use of tools to unlock a resource that has been secured with a password
A cryptographic protocol that provides communication security over the Internet.
A markup language
Rate this question:
Someone who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems
Someone who breaks into a computer system or network with malicious intent.
A hacker wearing a white hat
All of the above
Rate this question:
A general-purpose server-side scripting language originally designed for web development to produce dynamic web pages.
A set of rules for encoding documents in machine-readable form.
An application that captures data packets, which can be used to capture passwords and other data in transit over the network
All of the above
Rate this question:
A programming language that allows control of one or more applications
A type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users
A specialized kind of scripting language used for controlling a computer
A document or information resource that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device.
Rate this question:
The art of manipulating people into performing actions or divulging confidential information
A professional engineering discipline that deals with the design, construction, and maintenance of the physical and naturally built environment, including works like roads, bridges, canals, dams, and buildings.
A discipline of engineering that applies the principles of physics and materials science for analysis, design, manufacturing, and maintenance of mechanical systems.
The direct human manipulation of an organism's genome using modern DNA technology.
Rate this question:
A kit used by biologists when working with plants
The pre-defined name of a UNIX directory
A rootkit is designed to conceal the compromise of a computer's security.
A name server for the Domain Name System's root zone. It directly answers requests for records in the root zone and answers other requests returning a list of the designated authoritative name servers for the appropriate top-level domain (TLD).
Rate this question:
A japanese sumo technique.
A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
Both
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.