Scripting Best Practices

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:08 PM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Why must deployment of scripts be subject to best practices?

Deploying any type of code comes with the risk of introducing vulnerabilities

2
New cards

How could enabling an interpreter expand risk?

If the interpreter is not a default feature, enabling it expands the attack surface

3
New cards

What environment is mentioned as used to craft fileless malware?

PowerShell

4
New cards

How could a threat actor turn a script into a Trojan?

Modify the source code to make it act as malware

5
New cards

How could a script’s network port or user input become a vulnerability?

If the script does not handle input correctly, a threat actor could exploit a vulnerability to return unauthorized data or run arbitrary code

6
New cards

What controls should be applied to script source code to prevent unauthorized changes?

Access and version controls

7
New cards

What should be done to code before deployment to mitigate vulnerabilities and errors?

Scanned and tested for vulnerabilities and errors

8
New cards

What privilege level should scripts run with?

The minimum privileges necessary for the task

9
New cards

What is an example of accidental DoS from inadvertent system changes?

Powers off a system rather than restarting it or locks out remote access by changing a firewall configuration

10
New cards

What kinds of changes can weaken security configuration in this context?

Enabling the script environment, creating port exceptions, disabling scanning software so that the script executes successfully

11
New cards

What is stated about scripts that only work by disabling security mechanisms?

Not safe enough to consider running

12
New cards

Where should code be tested, and what should be done about required host changes?

Test in a development environment; include required changes and update/monitor through new configuration baselines

13
New cards

How can mishandling of resources cause accidental DoS?

Coding mistakes can lead to situations where the script mishandles computer or storage resources

14
New cards

What resource-handling vulnerability is associated with C/C++?

Requires very careful use of coding techniques to avoid creating vulnerabilities in the way instructions manipulate system RAM

15
New cards

How are scripting languages described with respect to memory handling?

Considered safe with respect to memory handling

16
New cards

What are three examples of resource mishandling by scripts?

Creating files that deplete disk storage resources; faulty loop that does not terminate and causes the script to hang; faulty API call that causes another process (such as the host browser) to crash

17
New cards

What must be done before deployment and during execution to catch these mistakes?

Test every script before deployment; monitor execution to pick up bugs not found in the test phase

Explore top flashcards

flashcards
Skeletal system II / Joints
175
Updated 410d ago
0.0(0)
flashcards
Business Quiz #1
34
Updated 1104d ago
0.0(0)
flashcards
100 questions.
100
Updated 296d ago
0.0(0)
flashcards
Chapter 8
41
Updated 1029d ago
0.0(0)
flashcards
Hamlet (Acts III-V) 76 words
76
Updated 1236d ago
0.0(0)
flashcards
Year 3 EMIs
309
Updated 383d ago
0.0(0)
flashcards
Skeletal system II / Joints
175
Updated 410d ago
0.0(0)
flashcards
Business Quiz #1
34
Updated 1104d ago
0.0(0)
flashcards
100 questions.
100
Updated 296d ago
0.0(0)
flashcards
Chapter 8
41
Updated 1029d ago
0.0(0)
flashcards
Hamlet (Acts III-V) 76 words
76
Updated 1236d ago
0.0(0)
flashcards
Year 3 EMIs
309
Updated 383d ago
0.0(0)