Scripting Solar Quiz Flashcards

1
Q

UNIX devices uses which scripting language ?

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Three high Level Languages 
Java
Python
C+
Assembly
A

Java, Python, C+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database is called:

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This type of attack relies on software running inside an organisation that allows access to a hacker

A

Back Door Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack uses a fraudulent server with a relay address?

A

MITM (Man in the Middle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One of the following is not a stage in the software development lifecycle

Design
Data Analytics
Testing
Coding

A

Data Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between UDP and TCP?

A

UDP is more efficient as it has a smaller header and does not require acknowledgments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which one of these devices uses UNIX and contains a UNIX shell?

MacBook Pro
Windows laptop
Tablet
Windows Server

A

MacBook Pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing is

A

A hacker attempting to gain user names and passwords by disguising identity as a trustworthy entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which types of social engineering attacks demand a physical presence by a hacker?

A

Tailgaiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The combination of multiple BOTs is knows as:

A

BOTNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security script is:

A

A program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor, and is used for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What attack uses a USB to infect users ?

A

Rubber Ducky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two of the following are included in Requirements Specification

USE CASE diagrams
Non functional requirements
CLASS diagram
Functional requirements

A

Non functional requirements

Functional requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One of the devices below is not used in security scripting

Games Console
MacBook Pro
Raspberry PI
Laptop

A

Games Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two of the languages listed below are not a scripting language

Assembly
PHP
HTML
JavaScript

A

Assembly and HTML

17
Q

Two types of Internet of Things implementation in the transport industry

A

Smart Parking

Traffic Control

18
Q

Order of decapsulation process

A

bits - frames - packets - segments

19
Q

Phishing is a form of:

A

Spamming

20
Q

Encapsulation process using TCP/IP model

A

Application - Session - Internet - Network Access

21
Q

JavaScript is a programming language used for:

A

Scripting

22
Q

The most popular language for writing scripts is:

A

JavaScript

23
Q

description of why CRC and FCS are performed

A

To ensure that a particular packet is not altered as it passes over the LAN

24
Q

The terms CRC and FCS mean

A

Cyclic Redundancy Check and Frame Check Sequence

25
Q

Which Operating System uses a CMD prompt to open a Command Line Interface:

A

Windows

26
Q

When there is an attack against a computer or network to reduce or prevent accessibility of its systems has occurred, what do we call this attack?

A

A denial of service attack

27
Q

One of the following best describes the process of CRC of a layer 2 frame

The FCS field within the frame header contains a mathematical representation of the frame’s contents
The FCS field within the frame header contains a copy of the sequence field used at transport layer
The FCS field within the frame header contains a copy of the frame’s contents
The FCS field within the frame header contains the source IP address

A

The FCS field within the frame header contains a mathematical representation of the frame’s contents

28
Q

What security level would you assign to the inside and the outside interface of a router?

A

Inside 100 and outside 0

29
Q

One of the following is the most common area for IoT devices in healthcare

Blood pressure
Wearable fitness gadgets
Diabetes check
Asthma attack

A

Wearable fitness gadgets

30
Q

What is referred to as a crime ware kit:

A

An exploit kit

31
Q

One of the languages listed below is a scripting language

CSS
Java
HTML
Perl

A

Perl

32
Q

Which development lifecycle is known to have a linear and sequential approach?

A

Waterfall