HS 235 Test 2 Modules 7-9 Quizes

Ace your homework & exams now with Quizwiz!

A technology that developers can use to display HTML documents to users on the fly

ASP

Writing programs in this language is easier than in machine language

Assembly language

Network of robot computers

Botnet

Takes you from one area of a program (a function) to another area

Branching

An error that causes unpredictable results

Bug

The interface that determines how a Web server passes data to a Web browser

CGI

An object-oriented programming structure that holds pieces of data and functions

Class

Program that converts a text-based program called source code, into executable or binary code

Compiler

Tells the compiler how to convert the value in a function

Conversion Specifier

The analysis of a running application for vulnerabilities

DAST

Performs an action first and then tests to see whether the action should continue to occur

Do loop

An attack that prevents legitimate users from accessing network resources

DoS

Ability to vary the information that is displayed on the Web page

Dynamic Web Page

A DDoS attack is launched against a host from a single server or workstation. True/False

False

A user can view the source code of a PHP file by using their Web browser's tools. True/False

False

JavaScript is a server-side scripting language that is embedded in an HTML Web page. True/False

False

Malware programs cannot be detected by antivirus programs. True/False

False

You must always add "//" at the end of comment text when using C language. True/False

False

Hardware devices or software that can be used to capture keystrokes on a computer

Keyloggers

Malicious software introduced into a network to help an attacker accomplish their goals

Malware

Attackers inject themselves between two parties or systems communicating with one another

Man-in-the-Middle

Standard database access method developed by the SQL Access Group and allows interoperability between back-end DBMSs

ODBC

Open-source server-side scripting language that runs on a server and enables Web developers to create dynamic Web pages

PHP

An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction

Ping of Death

An English-like language you can use to help create the structure of your program

Psuedocode

Virus that locks a target system until a demanded fee is paid

Ransomware

A program that usually hides in the OS tools, so it's almost impossible to detect

Rootkit

Analysis of an application's source code for vulnerabilities

SAST

The attacker supplies SQL commands when prompted to fill in a Web application field

SQLi

Displays the same information on the Web page regardless of who accesses the page

Static Web Page

A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer

Trojan

Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent. True/False

True

CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN. True/False

True

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use. True/False

True

Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network. True/False

True

Most programming languages have a way to branch, loop, and test. True/False

True

OLE DB relies on connection strings that enable the application to access the data stored on an external device. True/False

True

Security professionals often need to examine Web pages and recognize when something looks suspicious. True/False

True

Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript. True/False

True

When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again. True/False

True

Whitelisting allows only approved programs to run on a computer. True/False

True

Represents a numeric or string value

Variable

A pointer to the physical directory

Virtual Directory

Malicious program that attaches itself to a file or another program

Virus

A way of having your program repeat an action a certain number of times

While loop


Related study sets

Biology Chapter 10 Semester Exam Review Questions

View Set

AP Human Geography Chapter 8 Political Geography Notes

View Set

Prop & Casualty Insurance Basics

View Set

Chapter 07: Legal Dimensions of Nursing Practice (2)

View Set