Ethical Hacking Ch.7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

List 3 fundamental concepts of programming

1. Branching 2. Looping 3. Testing

List 4 syntax rules of perl

1. sub keyword is used in front of function names 2. variables begin with $ 3. comment lines begin with # 4. & indicates a function

What is the industry standard for bugs per code?

10 bugs for every 1000 lines

When was C developed?

1972

When was perl developed? By who?

1987, Larry Wall

Metasploit

A Ruby-based program used by security testers to check for vulnerabilities on computer systems

Branching

A type of program flow that takes you from one program area to another

Ruby

An object oriented language used by many security testers (similar to perl)

Who developed C?

Dennis Ritchie at Bell Laboratories

HTML a programming language (true or false)

False, it is a markup language (formatting language)

What do the symbols < and > denote?

HTML tags

What are the 2 types of operators?

Mathematical and Logical

Practical Extraction and Report Language (perl)

Powerful scripting language used to write scripts and programs for security professionals

Braces

Show where a function begins and ends

Conversion specifiers

Tell the compiler how to convert values in a function

What language was UNIX first written in? What language is it written in now?

assembly, c

Compiler

converts text-based program (i.e. source code) into executable or binary code

What does the "perldoc -f print" command do?

display description of a Perl print command

HTML uses branching, looping, and testing (true or false)

false

No C compilers can also create executable programs in C++ (true or false)

false

C is a weak and lengthy language (true or false)

false, it is powerful and concise

Perl does not run well on every platform (true or false)

false, runs on almost any platform

Hackers use C to create automates exploits and malicious bots (true or false)

false, they use perl

What does the "perl -h" command do?

gives a list of parameters used with perl command

#include statements in C code do what?

load libraries that hold commands and functions

What language is used by security professionals to perform repetitive tasks and conduct security monitoring (true or false)

perl

What are two of the most popular languages for security professionals?

perl and python

Classes

structures that hold pieces of data and functions

What is the :: symbol used for?

to separate the name of a class from a member function

C and Perl have similar syntax (true or false)

true

C++ is an enhancement of C (true or false)

true

Security professionals often need to examine web pages in order to recognize when something looks suspicious (true or false)

true

Security testers must have an understanding of Ruby basics and be able to modify the Ruby code (true or false)

true

Each HTML tag has a matching closing tag (true or false)

true, <HTML> and </HTML>

What is HTML mainly used for? Why?

web page formatting and layout because the syntax is basis for web development


Set pelajaran terkait

Electric Vehicles Final Study Guide

View Set

Health and Wellness Units One and Two

View Set

Chapter 22 Care of Patients with Immune Function Excess: Hypersensitivity (Allergy) and Autoimmunity - Key points and questions

View Set

AP Gov. & Pol. Checks on the Judicial Branch

View Set