Domain 8 Flashcards

1
Q

What is a Tuple

A

It is a row in a table in a relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Attribute

A

It is a column in a relational Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a table

A

It is the database that consists of tuples (rows) and attributes (columns)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Main Components of SQL database

A
  1. Schema
  2. Tables
  3. Views
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Schema

A

Describes a structure of a database, including any access controls limiting how the users will view the information contained in the tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Tables

A

Columns and rows (tuples) of the data are contained in tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are Views

A

“Defines what information a user can view in the tables. The view can be customized so that an entire table may be visible or a user may be limited to only being able to see just a row or a column. Views are created dynamically by the system for each user and provide access control granularity.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SDLC

A

Software Development Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Waterfall SDLC

A

“highly structured and does not allow for changes once the project is started and moved onto subsequent phases. Revisions are not allowed in later phases.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common SDLC Types

A

Waterfall, agile, spiral, others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prototyping

A

“In prototyping, the objective is to build a simplified version of the entire application, release it for review, and use the feedback from the stakeholders to review to build a second, much better version. This is repeated until the owner and stakeholders are satisfied with the final product. Prototyping is broken down into a step-by-step process that includes initial concept, design and implementation of initial prototype, refining the prototype until acceptable to the owner, and complete and release final version”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MPM

A

Modified Prototype Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define MPM

A

“A refined form of the above prototyping methodology that is ideal for web application development, it allows for the basic functionality of a desired system or component to be formally deployed in a quick time frame. The maintenance phase is set to begin after the deployment. The goal is to have the process be flexible enough so the application is not based on the state of the organization at any given time. As the organization grows and the environment changes, the application evolves with it rather than being frozen in time”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAD

A

Rapid Application Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define RAD

A

“Also, a refined form of prototyping, rapid application development (RAD) requires strict time limits on each phase and relies on efficient tools that enable quick development. The goal is to produce quality code quickly. While this sounds attractive, it must be handled properly because the quick development process may be a disadvantage if decisions are made so rapidly that it leads to poor design”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

JAD

A

Joint Analysis Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define JAD

A

“The premise is to have facilitation techniques that become an integral part of the management process that helps developers to work directly with owners and stakeholders to develop a working application. This is a novel idea that involves all stakeholders in the entire process. The success of this methodology is based on having key players communicating at all critical phases of the project. “

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define JAD

A

“The premise is to have facilitation techniques that become an integral part of the management process that helps developers to work directly with owners and stakeholders to develop a working application. This is a novel idea that involves all stakeholders in the entire process. The success of this methodology is based on having key players communicating at all critical phases of the project. “

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Implementations of Agile philosophy

A

SCRUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SCRUM

A
  1. user story “as a ___, I need___ so I can___”
    EPICS are large User stories
  2. Product backlog >Sprint backlog > WIP > done
  3. How to track progress
    burn up/burn down chart. Used to determine progress in what is being accomplished
21
Q

Roles of SCRUM

A

(want around 5-9 people on the team)

  1. SCRUM Master
    Job to remove impediment
    Keep the team adhering to SCRUM rules
  2. Product Owner (arguably most important)
    Voice of the customer. Needs to understand the business
  3. Team Member
    Testers, developers
22
Q

Clean room development

A
  1. Rigorous testing, focused on detecting, controlling, and avoiding bugs.
  2. Preferred as a security concern, quality achieved through design.
  3. Security should always be designed into the system based on requirements
23
Q

Trusts Computer Bases (TCB)

A

“is the collection of all the hardware, software, and firmware components within an architecture that are specifically responsible for security. The TCB is a term that is usually associated with security kernels and the reference monitor.”

24
Q

Security Kernel Must Meet What three basic fundamental requirement

A

Completeness - all accesses to information must go through

25
Q

Security Kernel Must Meet What three basic fundamental requirement

A

Completeness - all accesses to information must go through the kernel

Isolation - The Kernel itself must be protected from any type of unauthorized access

Verifiability - The kernel must be proven to meet design specifications

26
Q

Time Multiplexing

A

“allows the operating system to provide structured access by processes to resources according to a controlled and tightly managed time schedule. This schedule is defined as a short period of time, or a time slice, which will grant access to the system resources required by the process and then terminate that access once the time period has expired. “

27
Q

Time Multiplexing

A

“allows the operating system to provide structured access by processes to resources according to a controlled and tightly managed time schedule. This schedule is defined as a short period of time, or a time slice, which will grant access to the system resources required by the process and then terminate that access once the time period has expired. “

28
Q

Types of Unit or Bench Testing

A

White Box/Black box Testing - level or prior knowledge before testing system, for vulnerabilities penetration

Automated/manual Testing -

Static/Dynamic

Positive/negative test - Enter a test case with expectation it will pass it positive test case. a test case tested with the expectation to get a failure is a negative test case.

29
Q

Memory Manager Responsivities

A
  1. Relocation
  2. Protection
  3. Sharing
  4. Logical Organization
  5. Physical Organization
30
Q

OWASP Hosts 10 Ten Software Security vulnerabilties?

A

True

31
Q

OWASP Top 10 Currently

A
  1. Verify Security Early and Often
  2. Parameterize Queries
  3. Encode/Encrypt Data
  4. Validate ALL inputs
  5. Implement Identity and authentication Controls
  6. Implement Access Controls (2FA)
    7 Protect Data
  7. Implement Logging and Intrusion Detection
  8. Leverage Security and Frameworks and Libraries
  9. Handle errors and exceptions gracefully
32
Q

Steps of SDLC

A
  1. Initiation
  2. Design
  3. Development
  4. Implementation
  5. Maintenance
  6. End-of-life
33
Q

Step 3 of SDLC

A

Development

34
Q

Step 6 of SDLC

A

End-of-life

35
Q

Step 4 of SDLC

A

Implementation

36
Q

Step 1 of SDLC

A

Initiate

37
Q

Step 5 of SDLC

A

Maintenance

38
Q

Step 2 of SDLC

A

Design

39
Q

What do you do in each step of SDLC

A
  1. Initiate - identify security concerns
  2. Design - Formalize plans to address security
  3. Develop - Build Security into the software
  4. Implement - Test and Deploy Security Process
  5. Maintenance - exercise security and DR
  6. End-of-life - Unwind and destroy processes
40
Q

Varieties of Testing

A
  1. Unit Testing
  2. Integration Testing
  3. Regression Testing
  4. User-Acceptance Testing (UAT)
41
Q

Code Review types

A

Quality Assurance Review
Resolve Bugs/flaws
Review CVES

42
Q

Change Management Controls happen during which part of SDLC

A

Implementation and Maintenance Phase

43
Q

5 Categories of CMMI

A
  1. Initial
  2. Managed
  3. Defined
  4. Quantitatively Managed
  5. Optimized
44
Q

CMMI

A

Capability Maturity Model

45
Q

Steps of CMMI explained

A

initial - reactive, unpredictable, not controlled (think start up company)

Managed - reactive (minimal control, planned)

Defined - Proactive (standardized, documented processes

Quantitative Managed - proactive (like defined but using metrics to alter and tailor process)

Optimized - Industry Leader, standard maker

46
Q

IDEAL

A
Initiate
Diagnosing
Establishing
Acting
Learning
47
Q

IDEAL is a model for

A

Software process improvement

48
Q

Two Software Method Approahes

A

Imperative - State changes are instructed by programmer
Procedural
Object-oriented

Declarative - Desired outcome is instructed
Functional
Logical
Mathematical