Scripting Solar Quiz Flashcards
UNIX devices uses which scripting language ?
Shell
Three high Level Languages Java Python C+ Assembly
Java, Python, C+
A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database is called:
SQL Injection
This type of attack relies on software running inside an organisation that allows access to a hacker
Back Door Attack
What type of attack uses a fraudulent server with a relay address?
MITM (Man in the Middle)
One of the following is not a stage in the software development lifecycle
Design
Data Analytics
Testing
Coding
Data Analytics
What is the difference between UDP and TCP?
UDP is more efficient as it has a smaller header and does not require acknowledgments
Which one of these devices uses UNIX and contains a UNIX shell?
MacBook Pro
Windows laptop
Tablet
Windows Server
MacBook Pro
Phishing is
A hacker attempting to gain user names and passwords by disguising identity as a trustworthy entity
Which types of social engineering attacks demand a physical presence by a hacker?
Tailgaiting
The combination of multiple BOTs is knows as:
BOTNet
A security script is:
A program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor, and is used for security purposes
What attack uses a USB to infect users ?
Rubber Ducky
Two of the following are included in Requirements Specification
USE CASE diagrams
Non functional requirements
CLASS diagram
Functional requirements
Non functional requirements
Functional requirements
One of the devices below is not used in security scripting
Games Console
MacBook Pro
Raspberry PI
Laptop
Games Console