Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
Comptia A+ Core 2
> 2.4 - SQL Injection > Flashcards
2.4 - SQL Injection Flashcards
(2 cards)
Study These Flashcards
1
Q
Code injection
A
Code injection
– Adding your own information into a data stream
Enabled because of bad programming
– The application should properly handle input
and output
So many different data types
– HTML, SQL, XML, LDAP, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
SQL injection
A
SQL - Structured Query Language
– The most common relational database management
system language
SQL Injection
– Modify SQL requests (Your application shouldn’t allow this)
If you can manipulate the database,
then you control the application
– A significant vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
Comptia A+ Core 2
flashcards
Decks in class (69)
# Cards
1.1 An Overview of Windows
8
1.1 - Windows Features
8
1.1 - Windows Upgrades
5
1.2 - Windows Command Line Tools
15
1.2 - The Windows Network Command Line
8
1.3 - Task Manager
7
1.3 - The Microsoft Management Console
9
1.3 - Additional Windows Tools
6
1.4 - The Windows Control Panel
15
1.5 - Windows Settings
11
1.6 - Windows Network Technologies
8
1.6 - Configuring Windows Firewall
3
1.6 - Windows IP Address Configuration
3
1.6 - Windows Network Connections
5
1.7 - Installing Applications
10
1.8 - Operating System Overview
10
1.8 - Filesystems
5
1.9 - Installing Operating Systems
7
1.9 - Upgrading Windows
5
1.10 - macOS Overview
6
1.10 - macOS System Preferences
7
1.10 - macOS Features
12
1.11 - Linux Commands
20
1.11 - Linux Features
4
2.1 - Physical Security
9
2.1 - Physical Security for Staff
8
2.1 - Logical Security
7
2.1 - Active Directory
8
2.2 - Wireless Encryption
8
2.2 - Authentication Methods
5
2.3 - Malware
10
2.3 - Anti-Malware Tools
7
2.4 - Social Engineering
10
2.4 - Denial of Service
4
2.4 - Zero-Day Attacks
2
2.4 - On-Path Attacks
3
2.4 - Password Attacks
5
2.4 - Insider Threats
2
2.4 - SQL Injection
2
2.4 - Cross-site Scripting
5
2.4 - Security Vulnerabilities
6
2.5 - Defender Antivirus
3
2.5 - Windows Firewall
3
2.5 - Windows Security Settings
9
2.6 - Security Best Practices
10
2.7 - Mobile Device Security
9
2.8 - Data Destruction
5
2.9 - Securing a SOHO Network
15
2.10 - Browser Security
11
3.1 - Troubleshooting Windows
11
3.1 - Troubleshooting Solutions
14
3.2 - Troubleshooting Security Issues
6
3.3 - Removing Malware
9
3.4 - Troubleshooting Mobile Devices
8
3.5 - Troubleshooting Mobile Device Security
12
4.1 - Ticketing Systems
6
4.1 - Asset Management
3
4.1 - Document Types
9
4.2 - Change Management
11
4.3 - Managing Backups
10
4.4 - Managing Electrostatic Discharge
4
4.4 - Safety Procedures
4
4.5 - Environmental Impacts
7
4.6 - Privacy, Licensing, and Policies
13
4.7 - Communication
6
4.7 - Professionalism
5
4.8 - Scripting Languages
7
4.8 - Scripting Use Cases
8
4.9 - Remote Access
12