How Much Do You Know About Hacking?

10 Questions
How Much Do You Know About Hacking?

This is a short educational questionnare that aims to reveal to you a few techniques used by hackers and help you protect your code from being hacked. You will be given the correct answers and detailed explanations after you have finished answering all of the questions.

Please wait...
Questions and Answers
  • 1. 
    What is a security exploit?
    • A. 

      A prepared application that takes advantage of a known weakness

    • B. 

      A way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication

    • C. 

      A module studied by most Computer Science students

    • D. 

      A mobile internet solution

  • 2. 
    • A. 

      A general purpose programming language

    • B. 

      A type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data.

    • C. 

      A prototype-based scripting language that is primarily used in the form of client-side JavaScript, implemented as part of a Web browser in order to provide enhanced user interfaces and dynamic websites.

    • D. 

      An American quiz show featuring trivia in history, literature, the arts, pop culture, science, sports, geography, wordplay, and more.

  • 3. 
    How can SQL Injection be prevented?
    • A. 

      By sanitizing user input ( making sure that the user can't type anything else than what they are supposed to).

    • B. 

      By not using SQL anymore

    • C. 

      By making your code public

    • D. 

      All of the above

  • 4. 
    • A. 

      A secret word or string of characters that is used for authentication, to prove identity or gain access to a resource .

    • B. 

      A term used to describe the penetration of a network, system, or resource with or without the use of tools to unlock a resource that has been secured with a password

    • C. 

      A cryptographic protocol that provides communication security over the Internet.

    • D. 

      A markup language

  • 5. 
    What is a "white hat" hacker?
    • A. 

      Someone who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems

    • B. 

      Someone who breaks into a computer system or network with malicious intent.

    • C. 

      A hacker wearing a white hat

    • D. 

      All of the above

  • 6. 
    • A. 

      A general-purpose server-side scripting language originally designed for web development to produce dynamic web pages.

    • B. 

      A set of rules for encoding documents in machine-readable form.

    • C. 

      An application that captures data packets, which can be used to capture passwords and other data in transit over the network

    • D. 

      All of the above

  • 7. 
    • A. 

      A programming language that allows control of one or more applications

    • B. 

      A type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users

    • C. 

      A specialized kind of scripting language used for controlling a computer

    • D. 

      A document or information resource that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device.

  • 8. 
    What is Social Engineering?
    • A. 

      The art of manipulating people into performing actions or divulging confidential information

    • B. 

      A professional engineering discipline that deals with the design, construction, and maintenance of the physical and naturally built environment, including works like roads, bridges, canals, dams, and buildings.

    • C. 

      A discipline of engineering that applies the principles of physics and materials science for analysis, design, manufacturing, and maintenance of mechanical systems.

    • D. 

      The direct human manipulation of an organism's genome using modern DNA technology.

  • 9. 
    • A. 

      A kit used by biologists when working with plants

    • B. 

      The pre-defined name of a UNIX directory

    • C. 

      A rootkit is designed to conceal the compromise of a computer's security.

    • D. 

      A name server for the Domain Name System's root zone. It directly answers requests for records in the root zone and answers other requests returning a list of the designated authoritative name servers for the appropriate top-level domain (TLD).

  • 10. 
    What is a spoofing attack?
    • A. 

      A japanese sumo technique.

    • B. 

      A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

    • C. 

      Both