File Transfer Protocol FTP
What is the protocol to transfert file on the web ?
Uses an array to store multiple values in a single variable
What kind of single variable do you use to store multiple values ?
It's a fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is phishing ?
::1
What is the IPV6 loopback address ?
It means Operating System.
What means OS ?
Mock-up
What is the name of User interface prototype ?
Search Engine Optimization - SEO
What is the Optimization for search engines ?
That attack is a general term for when a perpetrator positions himself in a conversation between a user and an application
What is MITM attack ?
First is 32 bits (or 4 octets) long and second is 128 bits (or 8 octets) long.
How long are IPv4 and IPv6 ?
That Linux command display a terminal equivalent to Task Manager in Windows ?
What does "top" command do in linux?
To sign up
How to create an account ?
Version management involves managing all versions of one or more files
What is git ?
It's a type of malware. It restricts access to the computer system that it infects or the data that it stores (often using encryption techniques), and demands a ransom be paid to the creator(s) of the malware
What is a ransomware ?
It's a server that centralize the logs of several network equipments.
This is a distribution of the Linux operating system developped for the business market.
What is Red Hat Enterprise Linux (RHEL) ?
Eclipse
What is the java-oriented development environment called?
Procedure to verify the proper functioning of a specific part of a software or portion of a program.
What is th unit testing or component testing ?
It's a malicious attack that attempt to disrupt normal traffic to a web property
What is DDOS attack ?
That is a host that supports multiple client VMs by virtually sharing ressources, such as memory and processing.
What's an hypervisor ?
wget --no-check-certificate --content-disposition {YOUR_REPO} && tar -xvf ~/{DIRECTORY_NAME} && cd ~/{DIRECTORY_NAME} && Cmake && make && makeinstall && ./{YOUR_PROGRAM}
How to download, extract, compil, make a executable and run a program on one line?
a measurement of the amount of information that can be sent between computers, through a phone line
What is the bandwith ?
Put into production at the end of the qualification and integration phases
What is the continuous integrating ?
It is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database
What is Sql injection ?
The difference is that one operates on the physical layer and has just a single broadcast domain while the second operates on the data link layer and its different ports have separate collision domain.
What are the differences between a hub and a switch ?
grep -E -o "\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Za-z]{2,6}\b" filename.txt
How to find an email address on a file using grep ?