Server Exploits
Networks & Browsers
Server Vulnerabilities
Information Architecture
100

XSS Stands for what?

What is Cross Site Scripting

100

The smallest unit of data transmitted over a network.

What is a packet


100

This protocol is used for sending mail between devices and is historically prone to vulnerabilities.

What is SMTP


100

The C in the CIA triad stands for...?

What is Confidentiality
200

A commonly used language for managing and manipulating databases and information

What is SQL
200

This command-line tool measures the time it takes for a packet to travel to a destination and return.

What is Ping?

200

This is a type of hacker who attempts to access or compromise systems at the request of the system administrator

What is a penetration tester?

200

This device directs packets to their destination in a network.

What is a Router


300

This type of denial-of-service attack overwhelms a server by sending an excessive amount of ping requests.

What is a Ping Flood

300

This browser tool lets you view the HTML, CSS, and JavaScript of a website in real-time.

What are developer tools / inspect element.

300

This type of server vulnerability occurs when users access restricted parts of a website by manually changing URLs.

What is forceful browsing?

300

the physical and logical arrangement of devices and connections within a computer network

What is Network Topology?

400

A program that can be used to intercept and investigate network packets

What is Wireshark

400

This tool identifies the owner of a domain name and their contact information.

What is Whois?

400

This practice ensures that only necessary services run on a server to reduce vulnerabilities.

What is Server Hardening


400

This unique identifier, assigned to network interface cards (NICs), is used to distinguish devices on a local network.

What is a MAC address?

500

The process by which inputs are "cleansed" of potentially harmful database queries

Input/database sanitization
500

Wireshark can capture packets in this specific format for detailed analysis.

What is PCAP format

500

These files can contain sensitive information about device activity

What are log files



500

Which part of the CIA triad can make a network susceptible to a DDOS attack?


What is availability?

M
e
n
u