Chapter 7 Host, Data and Application Security Flashcards

1
Q

Relational Database

pg.216

A

most common approach to database implementation. Technology allows data to be viewed in dynamic ways based on the users or administrator’s needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One-Tier Model or Single-Tier environment

pg.216

A

database and the application exist on a single sytem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two-Tier Model

pg.217

A

Two-tier Model the client workstation or system runs an application that communicates with the database that is running on a different server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Third-Tier Model

pg.217

A

effectively isolates the end user from the database by introducing a middle term/third-tier model. Accepts clients requests from clients, evaluates them, and sends them back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

No SQL

pg.217

A

More servers on for database management. . Its relatively a new concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Big data

pg.218

A

organizations have to store extremely large amounts of data, often many terabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAN

pg.218

A

storage are network as a separate network set up to appear as a server to the main organizational network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fuzzing

pg.

A

the technique of providing unexpected values, numerical values as input to an application in order to make it crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Coding

pg.218

A

can best prevent many attack. Cross site scripting and SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OWASP

pg.219

A

Open Web Application Security Project is a voluntary group dedicated to forming secure coding practices for web based applications as well as mobile and client applications along the back end design issues. Organization has a range of coding standards, most fundamental is security validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cert Secure Coding Standards

pg.219

A

Computer Emergency Response Team (cert) at Carnage Mellon University also details standards for coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Baselining

pg.219

A

involves comparing performance to a metric. Can be done with any metric such as a network performance or CPU usage as well as with applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Metric

pg.219

A

a historical measure that you can point to and identify as coming before a configuration change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hotfix

pg.220

A

an immediate and urgent patch. Applied to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Patch

pg.220

A

provides some additional functionality or a non urgent fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Service Pack

pg.220

A

are a cumulative assortment of the hotfixes and patches to. Always tested first before being applied

17
Q

Permissions

pg.220

A

the most basic aspect of security

18
Q

Full control

pg.220

A

user can only read, execute and write and can also assign permissions to other uses

19
Q

Modify

pg.221

A

Is the same as read and write. with delete added

20
Q

Read and Execute

pg.221

A

not all files are documents so the read and execute programs

21
Q

Read

pg.221

A

the user can read but not to modify the file

22
Q

Write

pg.221

A

allows permission to modify the file

23
Q

Anti-virus

pg.221

A

Access and Control, authentication and authorization should be installed on workstations and servers. Actively monitoring of incoming files, scans should be conducted regularly

24
Q

Antispam filters

pg.221

A

are needed to keep the majority of this unwanted email from reaching the users

25
Q

Firewall

pg,222

A

first line of defense against attackers and malware.

26
Q

Security baseline

pg.226

A

defines the level of security that will be implemented and maintained for your organization

27
Q

Performance baseline

pg.227

A

provides the input needed to design, implement and support a secure network

28
Q

Filters

pg.228

A

allow you to limit the traffic to only that which is requested for your business can help ward off attacks

29
Q

FTP services

pg.229

A

aren’t intended for high security applications because of their inherent weaknesses

30
Q

Domain Name Service Denial of Service Attacks

pg.230

A

primarily aimed at DNS servers intended to disrupt the operations of servers making the system unusable

31
Q

Foot printing

pg.230

A

the act of gathering data about a network int order to find ways that someone might intrude

32
Q

Full Back up

pg.233

A

all changes to the data are archived

33
Q

Differential Backup

pg.233

A

all changes since the last full back up are archived

34
Q

Incremental Back up

pg.233

A

All changes since the last backup of any type are archived

35
Q

Geo-Tagging

pg.236

A

allows GPS coordinates to accompany a file such as an image

36
Q

Application White Listing

pg.236

A

are lists of those items that are allowed . Applications are approved and accepted on your network

37
Q

Data Loss Prevention

pg.236

A

Monitors the content of systems to make sure that key content is not deleted or removed

38
Q

Trusted Platform Module

pg.237

A

used to assist with hash key generation.assigned to a chip that can store cryptographic keys. passwords or certificates