WSI Flashcards

1
Q

Which of the following are database models?

Bohr’s model

Relational model

Hierarchical model

Catalog model

A

Relational model

Hierarchical model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software engineering is the science of:

Empirical

Based on mathematical theories

A

Empirical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The responsibilities of the Scrum Master include, among others:

Ensuring profit from the project

Scripting adherence to Scrum processes

Promoting Improved Engineering Practices

Task Priority Management

A

Scripting adherence to Scrum processes

Promoting Improved Engineering Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following attributes can be placed on the Student entity in the relational model:

PESEL

Numbers of all groups

Date of birth

Student’s Subjects

A

PESEL

Date of birth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spiral software life cycle model:

Makes it difficult for the customer to validate the product at the manufacturing stage

In practice, each phase is implemented in accordance with an iterative approach.

Makes it difficult to schedule a project

In practice, each phase is implemented in accordance with the cascade approach.

A

In practice, each phase is implemented in accordance with an iterative approach.

Makes it difficult to schedule a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Indicate the attributes of information security:

Indestructibility

Flexibility

Aggressiveness

Confidentiality

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unit tests are:

Usually automated

Checking the result obtained with the expected one

Testing the smallest elements of the system (e.g. single methods)

Based on the analysis of the source code

A

Usually automated

Checking the result obtained with the expected one

Testing the smallest elements of the system (e.g. single methods)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are data models:

Network model

Bohr’s model

Object model

The card model

A

Network model

Object model

The card model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The stages of open source information analysis and its results are:

Open Source Secure Data

Open Source Data

Open Source Information

Open Source Intelligence

A

Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spiral software life cycle model:

In practice, each phase is implemented in accordance with an iterative approach.

Makes it difficult for the customer to validate the product at the manufacturing stage

In practice, each phase is implemented in accordance with the cascade approach.

Makes it difficult to schedule a project

A

In practice, each phase is implemented in accordance with an iterative approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements is true?

NULL = NULL has the logical value NULL

NULL <> NULL has the logical value TRUE

NULL <> NULL has the logical value NULL

NULL = NULL has the logical value FALSE

A

NULL = NULL has the logical value NULL

NULL <> NULL has the logical value NULL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BlackBox tests are tests:

We look for errors in the code without running it

We test the system without knowing the source code

We introduce random errors into the system and check if it works the same

We test the system using our knowledge of the code

A

We test the system without knowing the source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following should a minimum user story in Scrum include?

description of functionality, business value

user indication, functionality description, business value

user indication, functionality description, size estimation

user indication, functionality description

A

user indication, functionality description, business value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In client-server architecture, the main roles of the client are:

SQL query processing

initial data validation

providing a convenient user interface

(I don’t remember the fourth one but it was probably bad)

A

initial data validation

providing a convenient user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is responsible for designing User Stories:

Scrum Master

Product Owner

the whole team

ordering

A

Product Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The SELECT statement is used to:

fetching records from the database

inserting records into the database

deleting records from the database

updating records in the database

A

fetching records from the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • (0)

Edgar Codd

Bill Gates

Niels Bohr

Alan Turing

A

Edgar Codd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • (8)

full copy contains all database data

the differential backup contains changes made after the last full backup

an incremental backup always contains all changes made after the last full backup

the differential backup contains only changes made after the last differential backup

A

full copy contains all database data

the differential backup contains changes made after the last full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • (9)

one use case is a mandatory part of another

one use case is an optional part of another

an actor can use another actor’s random usage

an actor can use a specific use case

A

one use case is an optional part of another

an actor can use a specific use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • (5)

The client may be a web browser

Most of the data is stored and processed on the client side.

The client can be a dedicated application created in some programming language

The server is always assigned exactly one client

A

The client may be a web browser

The client can be a dedicated application created in some programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Select the correct statements regarding indexes in database servers:

The programmer must specify in the SQL query that the index is to be used

When an index is installed on the table, the query will always execute faster

The index is necessary to be able to update the data

When an index is placed on the table, the query can be executed faster

A

When an index is placed on the table, the query can be executed faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Code-and-Fix software life cycle is suitable for use

Only in a large project

In a very small project

In every project

In no project

A

In a very small project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following statements are true?

The SQL INSERT statement is used to delete data from the database.

The INSERT SQL statement is used to modify data in the database.

The INSERT SQL statement is used to insert data into the database.

The SQL INSERT statement is used to read data from the database.

A

The INSERT SQL statement is used to insert data into the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following statements are true?

The SQL SELECT statement is used to read data from the database.

The SQL SELECT statement is used to insert data into the database.

The SQL SELECT statement is used to delete data from the database.

The SQL SELECT statement is used to update data in the database.

A

The SQL SELECT statement is used to read data from the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Select the correct statements regarding transaction log backup

It is useless if we do not have a full copy

It serves only a supporting function and should not be taken into account when planning a database backup strategy.

Allows you to restore the database state to a point in time

A transaction log backup contains all journal entries since the previous journal backup.

A

Allows you to restore the database state to a point in time

A transaction log backup contains all journal entries since the previous journal backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The purpose of the Daily Scrum(Stand up meeting) is

Selecting User Stories for implementation in the next Sprint

Exchange of information on work progress, plans and problems encountered

Estimating and refining Product Backlog item descriptions

Identifying new Product Backlog items

A

Exchange of information on work progress, plans and problems encountered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The purpose of building analytical models of information systems is

Better understanding of how the system works

Developer Skills Assessment

Defining requirements

A

Better understanding of how the system works

Defining requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Can there be an information system without computers?

Yes

NO

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

From the list below, select the properties that characterize the Use Cases

Can be used by exactly one Actor

Representing a single functionality of the system that has business value

Use case interaction can occur in many different ways

Can be used by any number of Actors

A

Representing a single functionality of the system that has business value

Can be used by any number of Actors

Use case interaction can occur in many different ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Represented in a relational database as a table is

A subset of the Cartesian product

The relationship between database tables

An ordered list of entities

A

A subset of the Cartesian product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Requirements capture and analysis is a phase of the software development process:

whose products can be the basis for preparing module tests on the “glass box” principle

which in practice never involves redefining business processes

the basic artifact of which is – in principle – the system specification adapted to the technology chosen by the client

A

the basic artifact of which is – in principle – the system specification adapted to the technology chosen by the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The responsibilities of the Product Owner include:

Ensuring compliance with Scrum processes

Promoting Improved Engineering Practices

Task Priority Management

Ensuring profit from the project

A

Task Priority Management

Ensuring profit from the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Mark the correct statements

The database server uses a buffer in RAM

each INSERT, DELETE, UPDATE statement is saved immediately after execution in the file containing the table data

each SELECT statement must always retrieve data directly from the hard drive (from which sources in the database the data is to be read)

A

The database server uses a buffer in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following attributes can be placed on the MusicAlbum entity in the relational model? Remember that every entity in the relational model must be in first normal form:

AlbumCode

Authors of Works

OpinionsListening

Titles of Songs

A

AlbumCode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Unit tests are tests:

Checking the result obtained with the expected one

In the case of programs in object-oriented languages, we test class methods

Testing the smallest elements of the system (e.g. single methods)

Consisting of entering random data into the system

A

Checking the result obtained with the expected one

Testing the smallest elements of the system (e.g. single methods)

In the case of programs in object-oriented languages, we test class methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The logical data structure in the relational data model is:

Table structure

List structure

The relational model does not impose any data structure

File structure

A

Table structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The relationship is:

represented in a relational database as a table

a subset of the Cartesian product

relationship between database tables

an ordered list of entities

A

relationship between database tables

38
Q

The stereotype «extend» means that:

An actor can use another actor’s use cases

An actor can use a specific use case

One use case is a mandatory part of another

One use case is an optional part of another

A

One use case is an optional part of another

39
Q

Inheritance is:

a relationship between classes that connects a more general class with a more specialized one

hiding the structure and implementation of the object

generalization of the set of connections between objects

an entity or idea mapped to a programming construct

A

a relationship between classes that connects a more general class with a more specialized one

40
Q

Association is:

generalization of the set of connections between objects

a relationship between classes that connects a more general class with a more specialized one

description of a group of objects that share the same set of properties (class)

entity or idea mapped to a programming construct (object)

#

A

generalization of the set of connections between objects

41
Q

Select the correct answer

TRUE AND NULL = NULL

False AND NULL = NULL

TRUE OR NULL = TRUE

TRUE OR NULL = NULL

A

TRUE AND NULL = NULL

TRUE OR NULL = TRUE

42
Q

Select the correct sentences regarding the transaction log in database servers.

transaction log helps maintain data consistency

keeping a transaction journal is not mandatory and you can opt out of it

thanks to the transaction log we can roll back transactions

each transaction is recorded in the journal immediately upon approval

A

transaction log helps maintain data consistency

thanks to the transaction log we can roll back transactions

43
Q

The responsibilities of a Scrum Master include:

Scripting adherence to Scrum processes

Promoting Improved Engineering Practices

Task Priority Management

Ensuring profit from the project

A

Scripting adherence to Scrum processes

Promoting Improved Engineering Practices

44
Q

Which of these teams are offensive?

Red Team

State Sponsored Hackers

White Caps

Blue Team

A

Red Team

State Sponsored Hackers

45
Q

White hats:

Blue Team members
Pentesters

Red Team members

Researchers

Hardware Engineers(security tools)

Software Engineers

Black TEAM members

Rubber Ducky

Ninja Team

P4 members

A

Blue Team members
Pentesters

Red Team members

Researchers

Hardware Engineers(security tools)

Software Engineers

46
Q

Red Teaming is:

Physical attacks

Social engineering attacks

Infecting workstations

Using Proxmark

Hypnosis

APT Foundations

Malware

A

Physical attacks

Social engineering attacks

Infecting workstations

47
Q

The stages of open source information analysis and its results are:

Open Source Secure Data

Open Source Data

Open Source Information

A

Open Source Information

48
Q

Which of the following statements are true:

The DELET statement of the SQL language is used to modify data in the database.

The DELET statement of SQL language is used to delete data from the database.

The DELET statement of the SQL language is used to insert data into the database.

The SQL DELET statement is used to read data from the database.

A

The DELET statement of SQL language is used to delete data from the database.

49
Q

In information security issues, defensive roles are:

Architect

Black Team

Auditor

A

Auditor

50
Q

Pentester roles:

Exploitation

Post-exploitation

Privilege Escalation

(there were 7 replies in total, including Exhumation and Pathology, seriously)

A

Exploitation

Post-exploitation

Privilege Escalation

51
Q

Who prioritizes User Stories?

Scrum Master

Client

The whole team

Product Owner

A

Product Owner

52
Q

An arsenal of weapons to combat news fraud

SPF

DKIM

DMARC

something else (unrelated)

A

SPF

DKIM

DMARC

53
Q

How to protect yourself from a hacker attack on your email

SPF

Spam filters

SMTP

some nonsensical answer - in Latin

A

SPF

Spam filters

54
Q

Requirements: a student belongs to one class, one class has many students. How to define tables in the relational model? (this is questions with drawings)

Student Table: StudentID, Name, Surname
Class table: classid, classlevel

Table [something]: classid, studentid

Student Table: StudentID, Name, Surname
Class table: classid, classlevel, studentid

(same as above only tables in reverse order)
Class table: classid, classlevel, studentid

Student Table: StudentID, Name, Surname

Student Table: StudentID, Name, Surname, ClassID
Class table: classid, classlevel

A

Student Table: StudentID, Name, Surname, ClassID
Class table: classid, classlevel

55
Q

Mark the correct answers:

NOT NULL= TRUE

TRUE OR NULL=NULL

FALSE AND NULL=NULL

FALSE AND NULL= FALSE

A

FALSE AND NULL= FALSE

56
Q

Black Box tests are tests in which:

We look for errors in the code without running it

We test the system using our knowledge of the source code

We introduce random errors into the system and check if it still works the same

We test the system without knowing the source code

A

We test the system without knowing the source code

57
Q

Which of the following statements are true:

The WHERE clause of the SELECT statement in SQL specifies the conditions that the rows being read must meet.

The ORDER BY clause of the SELECT statement in SQL specifies the conditions that must be met by the rows being read.

The WHERE clause of the SELECT statement in SQL determines how the rows read from the database are sorted.

The ORDER BY clause of the SELECT statement in SQL specifies the conditions that must be met by the rows being read.

A

The WHERE clause of the SELECT statement in SQL specifies the conditions that the rows being read must meet.

58
Q

Which of the following problems could be the result of technical debt?

None of the above, technical debt is a way to rip off the client

Increase in system implementation costs

Difficulties in implementing more user stories in future sprints

No possibility of further expansion of the system

A

Increase in system implementation costs

Difficulties in implementing more user stories in future sprints

No possibility of further expansion of the system

59
Q

The tasks of the Blue Team are:

Threat detection and analysis,

Quarantine, decommissioning and recovery.

“Pentest silently”

Social engineering attacks, phishing.

A

Threat detection and analysis,

Quarantine, decommissioning and recovery.

60
Q

Mark the correct answers:

TRUE and NULL = NULL

NOT NULL = NULL

NOT NULL = TRUE

TRUE OR NULL = NULL

A

TRUE and NULL = NULL

NOT NULL = NULL

61
Q

Which of the following statements are true about the relational database model?

a foreign key is a unique identifier of a row in a table

in a relational database table, rows can be repeated

There can only be one primary key in a table

There can be several foreign keys in a table

A

There can only be one primary key in a table

There can be several foreign keys in a table

62
Q

From the list below, select the properties that characterize a Use Case Actor:

such a concept does not exist

represents a category of users with specific needs and permissions

represents a specific person

may be a special case of another Actor

A

may be a special case of another Actor

63
Q

Insecure software - organizational security - indicate the correct answers:

Distribution of information about new types of malicious software and signs of its presence

Turning off computers after work

Test software for malicious code before installation
Defining the signs that indicate the probable presence of malicious software

Purchase software only from trusted sources

A

Distribution of information about new types of malicious software and signs of its presence

Turning off computers after work

Test software for malicious code before installation
Defining the signs that indicate the probable presence of malicious software

Purchase software only from trusted sources

64
Q

Select IT Security items (from the six-item version)

confidentiality
availability

vigilance

authenticity

flexibility

A

confidentiality
availability

authenticity

65
Q

Which of the following attributes can be placed on the Student entity in the relational model? Remember that every entity in the relational model must be in first normal form:

Student subjects

Start date of study

Date of birth

Student Assessment

A

Start date of study

Date of birth

66
Q

Select the correct answer:

FALSE AND NULL = FALSE

TRUE OR NULL = NULL

NOT NULL= TRUE

NOT NULL= NULL

A

FALSE AND NULL = FALSE

NOT NULL= NULL

67
Q

Which of the following statements are true?

The ORDER BY clause of the SELECT statement in SQL specifies how to sort the rows read from the database.

The FROM clause of the SELECT statement in SQL specifies the conditions that must be met by the rows being read.

The WHERE clause of the SELECT statement in SQL specifies the conditions that must be met by the rows being read.

The ORDER BY clause of the SQL SELECT statement specifies the tables from which data will be read.

A

The ORDER BY clause of the SELECT statement in SQL specifies how to sort the rows read from the database.

The WHERE clause of the SELECT statement in SQL specifies the conditions that must be met by the rows being read.

68
Q

Select IT Security Elements (from the six-element version):

Flexibility

Accuracy

Indestructibility

Authenticity

A

Authenticity

69
Q

To create high-quality software, you can use

Waterfall model

Code-and-fix

Prototyping

Cascade model

A

Waterfall model

Prototyping

Cascade model

70
Q

How does the Kanban approach differ from Scrum?

Another way to assess the importance of tasks

More flexibility of the Kanban process than in Scrum

More roles in Kanban than in Scrum

Another way to control the fluidity of the software development process

A

Another way to assess the importance of tasks

More flexibility of the Kanban process than in Scrum

Another way to control the fluidity of the software development process

71
Q

Inheritance is:

a description of a group of objects that share the same set of values

an entity or idea mapped to a programming construct

a relationship between actors that connects a more general actor with a more specialized one

generalization of the set of connections between objects

A
72
Q

Red Team - tools are:

USB Spear

Proxmark

Omega 13

USB Ninja

CTF

A

USB Spear
Proxmark
USB Ninja

73
Q

Pentest components include:

Determining the scope of the test

Post-exploitation

Bug Bounty

ISO certification

Enumeration

A
74
Q

Which of the following software development models are appropriate for software development?

waterfall model

“agile” models like Scrum

code-and-fix

prototyping model

A

waterfall model

“agile” models like Scrum

prototyping model

75
Q

Which tasks typically belong to the client role in a client-server architecture?

initial data validation

data storage

SQL query processing

presentation of data to the end user

A

initial data validation

presentation of data to the end user

76
Q

The most common types of email phishing are:

Spear phishing

Clone phishing

Whaling

Bulk phishing
Harpoon phishing

A

Spear phishing

77
Q

MTD Features and Benefits:

Detecting OS exploits, configuration changes, and vulnerabilities of jailbroken rooted devices in a sophisticated way
Providing vulnerability/risk analysis for mobile devices/OS, networks and applications

Implementation of secure access to internal Internet websites

Configuration of physical device security elements (lock code, encryption…)

Detecting jailbroken rooted devices

A

Detecting OS exploits, configuration changes, and vulnerabilities of jailbroken rooted devices in a sophisticated way
Providing vulnerability/risk analysis for mobile devices/OS, networks and applications

Detecting jailbroken rooted devices

78
Q

Which of the following statements are true?

NULL <> NULL has the logical value NULL

NULL <> NULL has the logical value FALSE

NULL <> NULL has the logical value TRUE

NULL = NULL has the logical value FALSE

A

NULL <> NULL has the logical value NULL

79
Q

In an agile project, the Product Owner is responsible for:

Removing obstacles from the team’s path

Providing the customer with a useful product

Following the Scrum rules

A

Providing the customer with a useful product

80
Q

Which of the following statements are true in the relational data model (I don’t know the correct answer)

the primary key is a unique identifier for a row in a table

in a relational database table, rows can be repeated

in a relational database, the only logical structure for storing data is tables

a foreign key is a pointer to a row in another table

A

The primary key is a unique identifier for a row in a table.
In a relational database, the only logical structure for storing data is tables.
A foreign key is a pointer to a row in another table.

81
Q

Which of the following are data models:

The card model

Network model

Hierarchical model

Object model

A

The card model

Network model

Hierarchical model

Object model

82
Q

Indicate the features that characterize classical methodologies (answers to be determined)

Emphasis on continuous customer contact

Emphasis on documentation and careful design

The need for periodic redesign and reimplementation of parts of the system

Division of the project into sequentially executed phases

A

Emphasis on documentation and careful design
Division of the project into sequentially executed phases

83
Q

What are the advantages of creating web clients in a client-server architecture?

easier system maintenance

no need to install software on the client side

more convenient and faster work with large amounts of data (the advantage of a desktop client)

A

easier system maintenance

no need to install software on the client side

84
Q

The most common types of email phishing are:

Bulk phishing
Harpoon phishing

Spear phishing

Clone phishing

Whaling

A

Spear phishing

Clone phishing

Whaling

85
Q

Which of the following statements are true about the relational data model:

A perspective is a logical structure for storing data.

The perspective is for presentation, not for storing data.

Data from a perspective can be read in the same way as data from tables.

The perspective shows the values ​​read from the database at the time of its launch.

A

The perspective is for presentation, not for storing data.

Data from a perspective can be read in the same way as data from tables.

The perspective shows the values ​​read from the database at the time of its launch.

86
Q

From the list below, select the properties that characterize the Use Case Actor.

may be a special case of another actor

such a concept does not exist

represents a specific person

can only be associated with one use case

A

may be a special case of another actor

87
Q

Which of the following statements are true?

The UPDATE statement is used to modify data in the database.

The UPDATE statement is used to insert data into the database.

The UPDATE statement is used to read data from the database.

The UPDATE statement is used to delete data in the database.

A

The UPDATE statement is used to modify data in the database.

88
Q

The ecosystem of mobile security solutions includes:

MAM
Mobile Application Management

EuroM.IND
European Monitoring Investigation and Enforcement Division

MCD
Mobile Content Defense

MDM
Mobile Device Management

A.RMOR
Altered, Rebuild Mobility and Operational Response Application

A

The ecosystem of mobile security solutions includes the following:

Mobile Device Management (MDM): This technology allows organizations to manage and secure mobile devices, including smartphones and tablets. MDM solutions can remotely wipe devices, enforce security policies, and track device location.

Mobile Application Management (MAM): MAM solutions focus on securing and managing mobile applications. They can control app distribution, enforce security policies within apps, and encrypt sensitive data.

Mobile Content Defense (MCD): MCD solutions protect sensitive data stored on mobile devices. They can encrypt data, control access to data, and prevent data leakage.

89
Q

The challenges related to mobility are: (correct answers to be verified)

Kardashev scale

Productivity

Pulse dialing

A

Kardashev scale

Pulse dialing

90
Q

Which of the following should a minimum user story in Scrum contain?

user indication, functionality description

user indication,functionality description,business value

user indication, business value

user indication,functionality description,size estimation

A

user indication,functionality description,business value