Domain 8 Set 1 Flashcards

1
Q

The 4 Software development Methodologies

A
  1. Waterfall model
    1. Prototype model
    2. Spiral model
    3. Agile model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Software development Methodologies is phase based?

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Software development Methodologie is not good with changes

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the Water fall good for long or short term projects

A

Short term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Design before code Methodologie ?

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Software development Methodologies work well with changes

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Software development Methodologies is good with large and mission critical projects?

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Software development Methodologies is costly

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hat Software development Methodologies is a lot on risk analysis

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Software development Methodologies use brainstorming

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Software development Methodologies is flexibility

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Software development Methodologies is less documented

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Software development Methodologies combination of Waterfall and prototyping

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cross Site Scripting (XSS) takes advantage of trust from who

A

I have in a web site (client side)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cross Site Request Forgery (CSRF) takes advantage of trust from who

A

Web site in ME (client side)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two client side threats

A
  1. Cross Site Request Forgery (CSRF)

2. Cross Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Drop table is what?

A

SQL code Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Polyinstantiation ?

A

Multiple instances of a event (laying about information to keep secure ) database use

19
Q

RFID

A

Radio frequency ID, chips on card cards, toll pass

20
Q

CVE

A

Common Vulnerabilities (Vulnerabilities database)

21
Q

CWE

A

Common weaknesses enumeration (lists) (Vulnerabilities database)

22
Q

NVD

A

national vulnerability databases (Vulnerabilities databases)

23
Q

US CERT

A

Computer Emergency Response Team (Vulnerabilities database) government

24
Q

What are the 4 database models?

A
  1. Hierarchical
  2. Distributed
  3. Object-oriented
  4. Relational
25
Q

this database structure is much like an org chart and is tree-like in fashion

A

Hierarchical

26
Q

Examples of this model are the DNS and Active Directory

A

Hierarchical

27
Q

in this model, there is no single server where the database resides. Instead, it is distributed across numerous locations.

A

Distributed

28
Q

this model uses the concept of objects as opposed to just treating everything as text. As a result, it’s more complex.

A

Object-oriented

29
Q

this model is based on tables that are related via fields that they hold in common.

A

Relational

30
Q

Examples of relational databases are MySQL and Oracle.

A

Relational

31
Q

model are re usability and being modular in nature

A

Object-oriented

32
Q

process assures that there are no duplicates in the table.

A

normalization

33
Q

which dictates that the primary can never be null (empty).

A

entity integrity

34
Q

carnality

A

The principles of a one-to-many relationship, in rows

35
Q

degree

A

The principles of a one-to-many relationship, in colunms

36
Q

tuples

A

collection of attributes in a row

37
Q

overall feel or design of a database

A

database schema

38
Q

in that it involves the perpetrator sending corrupt UDP packets to the host. It however allows the attacker to attack multiple ports

A

The Boink attack

39
Q

in that it involves the perpetrator sending corrupt UDP packets to the host. mainly directed to port 53 (DNS)

A

the Bonk attack

40
Q

involves the perpetrator sending overlapping packets to the victim, when their machine attempts to re-construct the packets the victim’s machine hangs.

A

The Teardrop attack

41
Q

where a perpetrator sends a large amount of ICMP echo (ping) traffic at broadcast addresses, all of it having a spoofed source address of a victim

A

A Smurf attack

42
Q

involves the perpetrator sending spoofed packet(s) with the SYN flag set to the victim’s machine on any open port that is listening. The packet(s) contain the same destination and source IP address as the host,

A

The Land attack

43
Q

wHAT ARE the 802.11 Wireless Frame four MAC Address fields:

A
  1. Access Point,
  2. Sender’s MAC,
  3. Router’s MAC
  4. Ad Hoc Mode