Assessment 2 Flashcards

1
Q

What does SQL stand for?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does SQL do?

A

To Query, operate, and Administer database systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SQL Injection

A

A hacker uses SQL commands in a weak area (such as login) and gains access to the backend database. The bad actor could attempt to view, change or delete data from the back-end server. The hacker could also use their access to open a network connection from inside the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Compromised Availability of data.

A

It can change data from the database. This could result in changes to a connected web page, or application. Can delete data, and audit information for the purpose of harm or mischief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does XSS stand for?

A

Cross Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does an XSS work?

A

XSS uses javascript stolen from a trusted site to get information about a single user’s personal web browser and break their privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does DDoS do?

A

An attack with multiple sources sending false requests to a server. The goal is to overload the servers and make it inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the kinds of harm a DDoS uses to achieve its goals?

A

Eating system resources like memory and cpu. Consuming network bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Botnet

A

A large number of computers, often controlled by malware, used too execute a DDoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly