business beginner

business intermediate
Security attack
Networking
Systems
100

File Transfer Protocol FTP

What is the protocol to transfert file on the web ?

100

Uses an array to store multiple values in a single variable

What kind of single variable do you use to store multiple values ?

100

It's a fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

What is phishing ?

100

::1

What is the IPV6 loopback address ?

100

It means Operating System.

What means OS ?

200

Mock-up

What is the name of User interface prototype ?

200

Search Engine Optimization - SEO

What is the Optimization for search engines ?

200

That attack is a general term for when a perpetrator positions himself in a conversation between a user and an application

What is MITM attack ?

200

First is 32 bits (or 4 octets) long and second is 128 bits (or 8 octets) long.

How long are IPv4 and IPv6 ?

200

That Linux command display a terminal equivalent to Task Manager in Windows ?

What does "top" command do in linux?

300

To sign up

How to create an account ?

300

Version management involves managing all versions of one or more files

What is git ?

300

It's a type of malware. It restricts access to the computer system that it infects or the data that it stores (often using encryption techniques), and demands a ransom be paid to the creator(s) of the malware

What is a ransomware ?

300

It's a server that centralize the logs of several network equipments.

What is a Syslog server ?
300

This is a distribution of the Linux operating system developped for the business market.

What is Red Hat Enterprise Linux (RHEL) ?

400

Eclipse

What is the java-oriented development environment called?

400

Procedure to verify the proper functioning of a specific part of a software or portion of a program.

What is th unit testing or component testing ?

400

It's a malicious attack that attempt to disrupt normal traffic to a web property 

What is DDOS attack ?

400

That is a host that supports multiple client VMs by virtually sharing ressources, such as memory and processing.

What's an hypervisor ?

400

wget --no-check-certificate --content-disposition {YOUR_REPO} && tar -xvf ~/{DIRECTORY_NAME} && cd ~/{DIRECTORY_NAME} && Cmake && make && makeinstall && ./{YOUR_PROGRAM}

How to download, extract, compil, make a executable and run a program on one line?

500

a measurement of the amount of information that can be sent between computers, through a phone line

What is the bandwith ?

500

Put into production at the end of the qualification and integration phases

What is the continuous integrating ?

500

It is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database

What is Sql injection ?

500

The difference is that one operates on the physical layer and has just a single broadcast domain while the second operates on the data link layer and its different ports have separate collision domain.

What are the differences between a hub and a switch ?

500

grep -E -o "\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Za-z]{2,6}\b" filename.txt

How to find an email address on a file using grep ?

M
e
n
u