HS 235 Test 2 Modules 7-9 Quizes
A technology that developers can use to display HTML documents to users on the fly
ASP
Writing programs in this language is easier than in machine language
Assembly language
Network of robot computers
Botnet
Takes you from one area of a program (a function) to another area
Branching
An error that causes unpredictable results
Bug
The interface that determines how a Web server passes data to a Web browser
CGI
An object-oriented programming structure that holds pieces of data and functions
Class
Program that converts a text-based program called source code, into executable or binary code
Compiler
Tells the compiler how to convert the value in a function
Conversion Specifier
The analysis of a running application for vulnerabilities
DAST
Performs an action first and then tests to see whether the action should continue to occur
Do loop
An attack that prevents legitimate users from accessing network resources
DoS
Ability to vary the information that is displayed on the Web page
Dynamic Web Page
A DDoS attack is launched against a host from a single server or workstation. True/False
False
A user can view the source code of a PHP file by using their Web browser's tools. True/False
False
JavaScript is a server-side scripting language that is embedded in an HTML Web page. True/False
False
Malware programs cannot be detected by antivirus programs. True/False
False
You must always add "//" at the end of comment text when using C language. True/False
False
Hardware devices or software that can be used to capture keystrokes on a computer
Keyloggers
Malicious software introduced into a network to help an attacker accomplish their goals
Malware
Attackers inject themselves between two parties or systems communicating with one another
Man-in-the-Middle
Standard database access method developed by the SQL Access Group and allows interoperability between back-end DBMSs
ODBC
Open-source server-side scripting language that runs on a server and enables Web developers to create dynamic Web pages
PHP
An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
Ping of Death
An English-like language you can use to help create the structure of your program
Psuedocode
Virus that locks a target system until a demanded fee is paid
Ransomware
A program that usually hides in the OS tools, so it's almost impossible to detect
Rootkit
Analysis of an application's source code for vulnerabilities
SAST
The attacker supplies SQL commands when prompted to fill in a Web application field
SQLi
Displays the same information on the Web page regardless of who accesses the page
Static Web Page
A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
Trojan
Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent. True/False
True
CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN. True/False
True
In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use. True/False
True
Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network. True/False
True
Most programming languages have a way to branch, loop, and test. True/False
True
OLE DB relies on connection strings that enable the application to access the data stored on an external device. True/False
True
Security professionals often need to examine Web pages and recognize when something looks suspicious. True/False
True
Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript. True/False
True
When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again. True/False
True
Whitelisting allows only approved programs to run on a computer. True/False
True
Represents a numeric or string value
Variable
A pointer to the physical directory
Virtual Directory
Malicious program that attaches itself to a file or another program
Virus
A way of having your program repeat an action a certain number of times
While loop