Chapter 11 Flashcards

1
Q

CSRF

A

Cross Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DevOps

A

Development and Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OWASP

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SDK

A

Software Development Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SDL

A

Software Development Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQL

A

Structured Query Langauge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QA

A

Quality Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

XSRF

A

Cross site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XSS

A

Cross site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4 environments Development, Test, Staging Production

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compiler

A

Compilers take computer programs written in one language and convert them to a set of codes that can run on a specific set of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Automation as it applies to DevOps

A

Automating routines and extensive processes allows fewer resources to cover more of the environment in a more effective and efficient manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code Reuse

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Continuous Delivery

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Continuous Deployment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Continuous Integration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Continuous monitoring

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Continuous validation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Exposure

A

Loss of control of data from a system during operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dead Code

A

Code that may be executed but is never actually used in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dead Code Elimination

A

Compilers that can take care of and remove dead code

22
Q

Deprovisioning

A

The removal of permissions or authorities.

23
Q

Elasticity

A

The characteristic that something is capable of change without breaking.

24
Q

Fuzzing

25
Q

Garbage Collection

26
Q

Legacy Code

27
Q

Memory leaks

28
Q

Normalization

29
Q

Patch Management

30
Q

Provisioning

31
Q

Scalability

A

the characteristic of a software system to process higher workloads on its current resources (scale up) or on additional resources (scale out) without interruption.

32
Q

Scripting

33
Q

Software Integrity

34
Q

Third Party Libraries

35
Q

Versioning

36
Q

What environment does the test environment mimic?

A

Production

37
Q

What are two advantages of using SDK’s and third party libraries?

38
Q

What is an advantage of a stored procedure?

39
Q

What is a disadvantage of a stored procedure?

40
Q

What is DevOps?

41
Q

Can encoded transmissions be used to bypass security mechanisms?

42
Q

Maintaining control of codebase integrity means what two things are happening?

43
Q

What is obfuscated/camoflaged code?

44
Q

What do 0 and 1 mean in binary code?

45
Q

Does all code possess weaknesses and vulnerabilities?

46
Q

Why is the client not a suitable place to perform any critical value checks or security checks?

47
Q

In terms of software scalability, what is the difference between scaling up and scaling out?

48
Q

What is the monoculture avoidance as it applies to software diversity?

49
Q

What are some programming languages used today?

50
Q

What is legacy code? Should it be used in modern software development?

51
Q

How is hashing used with codebase?