Domain 8 Set 1 Flashcards

(43 cards)

1
Q

The 4 Software development Methodologies

A
  1. Waterfall model
    1. Prototype model
    2. Spiral model
    3. Agile model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Software development Methodologies is phase based?

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Software development Methodologie is not good with changes

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the Water fall good for long or short term projects

A

Short term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Design before code Methodologie ?

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Software development Methodologies work well with changes

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Software development Methodologies is good with large and mission critical projects?

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Software development Methodologies is costly

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hat Software development Methodologies is a lot on risk analysis

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Software development Methodologies use brainstorming

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Software development Methodologies is flexibility

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Software development Methodologies is less documented

A

Agile model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Software development Methodologies combination of Waterfall and prototyping

A

Spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cross Site Scripting (XSS) takes advantage of trust from who

A

I have in a web site (client side)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cross Site Request Forgery (CSRF) takes advantage of trust from who

A

Web site in ME (client side)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two client side threats

A
  1. Cross Site Request Forgery (CSRF)

2. Cross Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Drop table is what?

A

SQL code Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Polyinstantiation ?

A

Multiple instances of a event (laying about information to keep secure ) database use

19
Q

RFID

A

Radio frequency ID, chips on card cards, toll pass

20
Q

CVE

A

Common Vulnerabilities (Vulnerabilities database)

21
Q

CWE

A

Common weaknesses enumeration (lists) (Vulnerabilities database)

22
Q

NVD

A

national vulnerability databases (Vulnerabilities databases)

23
Q

US CERT

A

Computer Emergency Response Team (Vulnerabilities database) government

24
Q

What are the 4 database models?

A
  1. Hierarchical
  2. Distributed
  3. Object-oriented
  4. Relational
25
this database structure is much like an org chart and is tree-like in fashion
Hierarchical
26
Examples of this model are the DNS and Active Directory
Hierarchical
27
in this model, there is no single server where the database resides. Instead, it is distributed across numerous locations.
Distributed
28
this model uses the concept of objects as opposed to just treating everything as text. As a result, it’s more complex.
Object-oriented
29
this model is based on tables that are related via fields that they hold in common.
Relational
30
Examples of relational databases are MySQL and Oracle.
Relational
31
model are re usability and being modular in nature
Object-oriented
32
process assures that there are no duplicates in the table.
normalization
33
which dictates that the primary can never be null (empty).
entity integrity
34
carnality
The principles of a one-to-many relationship, in rows
35
degree
The principles of a one-to-many relationship, in colunms
36
tuples
collection of attributes in a row
37
overall feel or design of a database
database schema
38
in that it involves the perpetrator sending corrupt UDP packets to the host. It however allows the attacker to attack multiple ports
The Boink attack
39
in that it involves the perpetrator sending corrupt UDP packets to the host. mainly directed to port 53 (DNS)
the Bonk attack
40
involves the perpetrator sending overlapping packets to the victim, when their machine attempts to re-construct the packets the victim's machine hangs.
The Teardrop attack
41
where a perpetrator sends a large amount of ICMP echo (ping) traffic at broadcast addresses, all of it having a spoofed source address of a victim
A Smurf attack
42
involves the perpetrator sending spoofed packet(s) with the SYN flag set to the victim's machine on any open port that is listening. The packet(s) contain the same destination and source IP address as the host,
The Land attack
43
wHAT ARE the 802.11 Wireless Frame four MAC Address fields:
1. Access Point, 2. Sender's MAC, 3. Router's MAC 4. Ad Hoc Mode