pencil-icon
Build your own quiz

Computers

Professional Development

Image

Writer Quiz

1
play

5 questions

Show Answers
See Preview
  • 1. Multiple Choice
    30 seconds
    1 pt

    Once you have identified an SQL injetction and wish to exploit it, what is one of the first steps to take (as presented today)?

    Find out the number of columns involved in the original request

    Use the SQL Injection to bypass the authentication mechanism

    Fire up SQLmap

  • 2. Multiple Choice
    30 seconds
    1 pt

    What is the name of the utility that allows editing of keyboard input for any command?

    nikto

    ohmyzsh

    setxkbmap

    rlwrap

  • 3. Multiple Choice
    30 seconds
    1 pt

    What type of vulnerability was not exploited in today's wlakthrough:

    SQL Injection

    Cross Site Scripting

    Command Injection

  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?