A prepared application that takes advantage of a known weakness
A way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
A module studied by most Computer Science students
A mobile internet solution
A general purpose programming language
A type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data.
An American quiz show featuring trivia in history, literature, the arts, pop culture, science, sports, geography, wordplay, and more.
By sanitizing user input ( making sure that the user can't type anything else than what they are supposed to).
By not using SQL anymore
By making your code public
All of the above
A secret word or string of characters that is used for authentication, to prove identity or gain access to a resource .
A term used to describe the penetration of a network, system, or resource with or without the use of tools to unlock a resource that has been secured with a password
A cryptographic protocol that provides communication security over the Internet.
A markup language
Someone who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems
Someone who breaks into a computer system or network with malicious intent.
A hacker wearing a white hat
All of the above
A general-purpose server-side scripting language originally designed for web development to produce dynamic web pages.
A set of rules for encoding documents in machine-readable form.
An application that captures data packets, which can be used to capture passwords and other data in transit over the network
All of the above
A programming language that allows control of one or more applications
A type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users
A specialized kind of scripting language used for controlling a computer
A document or information resource that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device.
The art of manipulating people into performing actions or divulging confidential information
A professional engineering discipline that deals with the design, construction, and maintenance of the physical and naturally built environment, including works like roads, bridges, canals, dams, and buildings.
A discipline of engineering that applies the principles of physics and materials science for analysis, design, manufacturing, and maintenance of mechanical systems.
The direct human manipulation of an organism's genome using modern DNA technology.
A kit used by biologists when working with plants
The pre-defined name of a UNIX directory
A rootkit is designed to conceal the compromise of a computer's security.
A name server for the Domain Name System's root zone. It directly answers requests for records in the root zone and answers other requests returning a list of the designated authoritative name servers for the appropriate top-level domain (TLD).
A japanese sumo technique.
A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.