Chapter 7: Host, Data. and Application Security Flashcards

1
Q

Any sophisticated series of related attacks taking place over an extended period of time.

A

Advanced Persistent Threats (APTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A method of software development meant to be rapid.

A

Agile development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Creating a fundamental, or baseline, security level.

A

Baselining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data that is larger than what can be handled with traditional tools and algorithms.

A

Big Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of removing duplication in a relational database.

A

Database Normalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating system in a device, sometimes on a single chip.

A

Embedded System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A method of testing that intentionally enters invalid input to see if the application can handle it.

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of making a server or an application resistant to an attack.

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of managing and provisioning computer datacenters through machine-readable definition files.

A

Infrastructure as Code (IaC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Devices that interact on the Internet, without human intervention.

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Datastores that do not use a relational structure.

A

NoSQL Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An online community that develops free articles, documentation, tools, and more on web application security.

A

Open Web Application Security Project (OWASP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Creating a version of an application that has only the bare minimum functionality so that it can be evaluated before further development.

A

Prototyping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating in an isolated environment.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attacker with very minimal skills.

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programming in a manner that is secure.

A

Secure Coding

17
Q

SQL statements written and stored on the database that can be called by applications.

A

Store Procedures

18
Q

Subjecting a system to workloads that are extreme.

A

Stress Testing

19
Q

The language used by all relational databases.

A

Structured Query Language (SQL)

20
Q

A software development method that uses very well-defined sequential phases.

A

Waterfall Method

21
Q

A vulnerability that is unknown to the product vendor, and thus there is no patch for it.

A

Zero-Day Exploit