| Odpowiedź | % Poprawnych |
|---|---|
| Cross Site Request Forgery | 100%
|
| Cross site scripting | 100%
|
| Denial of Service | 100%
|
| Distributed Denial of Service | 100%
|
| Domain hijacking | 100%
|
| Hijacking | 100%
|
| Man in the browser | 100%
|
| Man In The Middle | 100%
|
| Pass the Hash | 100%
|
| Privilege escalation | 100%
|
| Replay | 100%
|
| SQL Injection | 100%
|
| URL Hijacking | 100%
|
| Zero day | 100%
|
| API Abuse | 0%
|
| ARP poisoning | 0%
|
| Broken Authentication | 0%
|
| Brute Force Attack | 0%
|
| Buffer overflow | 0%
|
| Clickjacking | 0%
|
| Code Injection | 0%
|
| Command Injection | 0%
|
| Content Spoofing | 0%
|
| Directory Enumeration | 0%
|
| Directory Enumeration | 0%
|
| DNS Amplification | 0%
|
| DNS poisoning | 0%
|
| HTTP Header Injection | 0%
|
| IP spoofing | 0%
|
| LDAP Injection | 0%
|
| Local File Inclusion | 0%
|
| MAC spoofing | 0%
|
| Memory Leak Exploits | 0%
|
| Path Traversal | 0%
|
| Refactoring | 0%
|
| Remote File Inclusion | 0%
|
| Server-Side Request Forgery | 0%
|
| Session Hijacking | 0%
|
| Shimming | 0%
|
| Subdomain Takeover | 0%
|
| Web Shell Exploits | 0%
|
| XML External Entity | 0%
|