Chapter 7 Flashcards

1
Q

Relational Database

A

Most common approach to database implementation. Allows data to be viewed in dynamic ways based on the user’s or administrator’s needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NoSQL

A

A non-relational/distributed dynamic database that does not use SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One-Tier Model

A

The database and application exist on a single system. Common on desktop systems running a standalone database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two-Tier Model

A

The client workstation or system runs an application that communicates with the database that is running on a different server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three-Tier Model

A

isolates the end user from the database by introducing a middle-tier server. It evaluates them and sends them on the database server for processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAN

A

Storage Area Network

A separate network set up to appear as a server to the main organization network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fuzzing

A

technique of providing unexpected values as input to an application in order to make it crash. Values can be random, invalid, or just unexpected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Coding

A

the best way to prevent many attacks. It’s a broad concept. Keeping coding secure can prevent SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OWASP

A

Open Web Application Security Project

a voluntary group dedicated to forming secure coding practices for web based applications as well as mobile and client applications along with back-end design issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CERT

A

Computer Emergency Response Team

addresses exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DLP

A

Data Loss Protection

Systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RAID 3 or 4

A

Striped Disks with Dedicated Parity

Needs three or more disks with data distributed over disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAID 6

A

Striped with Dual Parity

combines 4 or more disks in a way that protects data against the loss of any two disks. Adds an additional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hotfix patch

A

is an immediate and urgent patch. In general, these represent serious security issues and are not optional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Patch

A

Provides added functionality or a non urgent fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Service Pack

A

Cumulative assortment of the hotfixes and patches to date

17
Q

HSM

A

Hierarchical Storage Management

Provides continuous online backup by using optical or tape jukeboxes. It appears as an infinite disk to the system

18
Q

Antimalware Best Practices

A
Install Antivirus
Install Antispam Filters
Install Antispyware Filters
Use Pop-up blockers
Use host-based firewalls
Use host based IDSs
19
Q

How to harden FTP

A

Create a separate file areas for the transfers
If possible, use a VPN or SSH
Use separate login accounts
Disable anonymous user accounts

20
Q

Footprinting

A

Act of gathering data about a network in order to find ways that someone might intrude. Looks for vulnerabilities and any means of entry

21
Q

Hardening DHCP Services

A

Only one DHCP server should be running at a time

Use NAT

22
Q

Types of backups

A

Full - All changes and data archived
Differential - All changes since the last full backup
Incremental - All changes since the last backup of any kind

23
Q

Clustering

A

Used parallel processing (improving performance and availabilty) and adds redundancy

24
Q

Load Balancing

A

High availability can be maintained through splitting using multiple servers

25
Q

Hardening Email Servers

A

Use Antivirus Scanners to filter out malicious emails