Chapter 10 Flashcards
What is a systematic effort to identify relationships between mission critical apps, processes, and ops?
Critical Path Analysis
What is the tendency for various technologies, solutions, utilities, and systems to evolve and merge over time.
Technology Convergence
What addresses facility design, landscaping, entrance concepts, campus layouts, lighting, road placement, and traffic management.
CPTED
What are some security suggestions from CPTED?
Keep plants under 2.5 feet tall
Locate the data center at the core of the bldg
Mount cameras in full view
Keep entrances open and clear
Keep the number of entrances to a minimum
What describes the idea of making an entrance point look like an entrance point without obvious signs?
Natural Access Control
What describes the means to create an open and obstacle-free area outside the building for people and criminals to be easily observed?
Natural Surveillance
What describes the actions of making an area feel like a community cares for it and intruders are at higher risk of detection ?
Natural Territorial Reinforcement
Where should server rooms be located ?
At the center of the building
What reflects or alters the electromagnetic field generated by the reader device ?
Passive Proximity Device
What is an example of a field powered proximity device ?
RFID
What is a mechanism by which a communication pathway is either constantly or periodically checked with a test signal ?
Heartbeat Sensor
What describes the evaluation of the way someone walks as a form of biometric authentication/identification.
Gait Analysis
What are some ways to prepare for equipment failures ?
Purchasing replacement parts
Storing equipment
Establishing an SLA with the Vendor
What describes the expected typical functional lifetime of the device?
MTTF
What describes the average length of time required to perform a repair on a device ?
MTTR
What describes the estimation of time between the first failure and any subsequent failures after that.
MTBF
What evaluates whether every if statement has been executed under all if and else conditions
Branch Coverage
What tests whether every logical test in the code has been executed under all sets of input.
Condition Coverage
What verifies that every function in the code has been called and returned results.
Function Coverage
What verifies that every loop in the code has been executed under conditions that cause code execution multiple times, only once, and not at all.
Loop Coverage
What offers high throughput with the least interference.
OFDM
What is used to register a host’s dynamic multicast group membership in order to receive a copy of the data stream.
IGMP
What occurs with a continuous signal that varies in frequency, amplitude, phase, voltage, and so on.
Analogue Communications
What systems can be used to host or cache multicast datasets that are to be sent to the multiple recipients.
TFTP
What is a nonprofit security project focusing on improving security for online or web-based applications, mobile device applications, and IoT equipment.
OWASP
What is a programming and management technique used to reduce redundancy, often related to database management.
Normalization
What are an allow lists of existing software functions where users or other applications are limited to the pre-determined range of functions.
Stored Procedures
What is an application that can serve as a basic firewall by restricting access based on user IDs or system IDs.
TCP Wrapper
What is a mechanism to tunnel TCP/IP through non-IP networks.
L2TP
What database feature uses a “lock” feature to allow an authorized user to make changes and then “unlock” the data elements only after the changes are complete.
Concurrency
What refers to the number of rows in the table?
Cardinality
What adds a degree of fault tolerance, protecting against the impact of a single server failure.
Clustering
What refers to creating the account and capturing biometric data.
Registration
What an authorization framework described in Request for Comments (RFC) 6749.
OAuth 2.0
What are converged protocols, which provide for a SAN and voice communication services.
VoIP
ISCSI
FCoE
What is needed to provide and support certificates for DNSSEC?
PKI
What are the six risk management frameworks ?
RMF
OCTAVE
COSO
ISACA
FAIR
TARA