Domain 8 Set 1 Flashcards
The 4 Software development Methodologies
- Waterfall model
- Prototype model
- Spiral model
- Agile model
What Software development Methodologies is phase based?
Waterfall model
What Software development Methodologie is not good with changes
Waterfall model
is the Water fall good for long or short term projects
Short term
Design before code Methodologie ?
Waterfall model
What Software development Methodologies work well with changes
Agile model
What Software development Methodologies is good with large and mission critical projects?
Spiral model
What Software development Methodologies is costly
Spiral model
hat Software development Methodologies is a lot on risk analysis
Spiral model
What Software development Methodologies use brainstorming
Agile model
What Software development Methodologies is flexibility
Agile model
What Software development Methodologies is less documented
Agile model
What Software development Methodologies combination of Waterfall and prototyping
Spiral model
Cross Site Scripting (XSS) takes advantage of trust from who
I have in a web site (client side)
Cross Site Request Forgery (CSRF) takes advantage of trust from who
Web site in ME (client side)
Two client side threats
- Cross Site Request Forgery (CSRF)
2. Cross Site Scripting (XSS)
Drop table is what?
SQL code Injection
Polyinstantiation ?
Multiple instances of a event (laying about information to keep secure ) database use
RFID
Radio frequency ID, chips on card cards, toll pass
CVE
Common Vulnerabilities (Vulnerabilities database)
CWE
Common weaknesses enumeration (lists) (Vulnerabilities database)
NVD
national vulnerability databases (Vulnerabilities databases)
US CERT
Computer Emergency Response Team (Vulnerabilities database) government
What are the 4 database models?
- Hierarchical
- Distributed
- Object-oriented
- Relational
this database structure is much like an org chart and is tree-like in fashion
Hierarchical
Examples of this model are the DNS and Active Directory
Hierarchical
in this model, there is no single server where the database resides. Instead, it is distributed across numerous locations.
Distributed
this model uses the concept of objects as opposed to just treating everything as text. As a result, it’s more complex.
Object-oriented
this model is based on tables that are related via fields that they hold in common.
Relational
Examples of relational databases are MySQL and Oracle.
Relational
model are re usability and being modular in nature
Object-oriented
process assures that there are no duplicates in the table.
normalization
which dictates that the primary can never be null (empty).
entity integrity
carnality
The principles of a one-to-many relationship, in rows
degree
The principles of a one-to-many relationship, in colunms
tuples
collection of attributes in a row
overall feel or design of a database
database schema
in that it involves the perpetrator sending corrupt UDP packets to the host. It however allows the attacker to attack multiple ports
The Boink attack
in that it involves the perpetrator sending corrupt UDP packets to the host. mainly directed to port 53 (DNS)
the Bonk attack
involves the perpetrator sending overlapping packets to the victim, when their machine attempts to re-construct the packets the victim’s machine hangs.
The Teardrop attack
where a perpetrator sends a large amount of ICMP echo (ping) traffic at broadcast addresses, all of it having a spoofed source address of a victim
A Smurf attack
involves the perpetrator sending spoofed packet(s) with the SYN flag set to the victim’s machine on any open port that is listening. The packet(s) contain the same destination and source IP address as the host,
The Land attack
wHAT ARE the 802.11 Wireless Frame four MAC Address fields:
- Access Point,
- Sender’s MAC,
- Router’s MAC
- Ad Hoc Mode