Exam 2 Flashcards

1
Q

Programs typically consist of 3 fundamental flow control patterns, which are:

A

sequence, selection, and repetition. P. 121

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does VPN stand for?

A

Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Three primary information security areas are

A

Authentication and authorization
Are people who they say they are?
Do they have permission?

Prevent and resist a breach
Monitors traffic spanning outside and inside
Prevents a breach

Detection and response (breach occurred)
Respond before damage can be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common way to identify individual users, and also the most ineffective form of authentication?

A

User ID and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

a technique to gain personal information for the purpose of identity theft (sending an email to someone that appears to be from BYU asking for username and password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of a simple password?

A

homer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a password with requirements?

A

Homerjs1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of a random password?

A

@#4Tj`9q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of a passphrase password?

A

purplemonkeydishwater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Smart cards and tokens are (more/less) effective than a user ID and a password

A

more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a token?

A

small electronic devices that change user passwords automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a smart card?

A

a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are biometrics?

A

the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the best and most effective way to manage authentication?

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the most costly and intrusive way to manage authentication?

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List 3 ways to help prevent and build resistance to attacks

A

content filtering
encryption
firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Know that all of these are threats to security

A

Fire
Water
Vibration and movement (earthquakes, landslides, explosions)
Severe weather (hurricanes, tornadoes, high winds, severe lightening, etc)
Electrostatic discharge
high humidity causes corrosion, low humidity causes ESD
Electrical noise (EMI and RFI interference)
Electrical anomalies (blackout, brownout, fault, spike, sag, surge, inrush)
Lightning strikes
Magnetic fields
Sabotage/terrorism/war/theft/vandalism
Equipment failure
Loss of communications and utilities
Personnel loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 3 elements to the CIA triad and what do they represent?

A

Confidentiality: authentication and authorization (something you know, something you have, who you are)
Availability: authorized users have access when they need it.
Integrity: Protecting data from unauthorized modification or deletion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is network sniffing?

A

Intercepting packages on a wired/wireless network and viewing the contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the difference between a virus and a worm?

A

A worm can spread itself without needing users to share the virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a trojan horse virus?

A

a malicious program disguised to be legitimate/ useful (hence the name trojan horse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the difference between a denial of service and a distributed denial of service?

A

a denial of service is an army of zombie computers controlled by malware requesting the webpage.
a distributed denial of service is a coordinate effort to flood a system (actual people). For example: registering for classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social engineering is considered to be a ____ threat.
Small
Average size
Huge

A

Huge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: Only people with ‘highly valued’ information are at risk of becoming victim to costly security breaches?

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are hactivists?

A

Hactivists (hackers who are activists) promote political ends through breaking into computers or networks. They may deface a website (changing the appearance or content of a website) that is contrary to their opinion or make confidential information public to accomplish their political objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are cyberterrorists?

A

Cyberterrorists refer to hackers who use the internet to accomplish terrorist acts. Cyberterrorist acts may include disrupting or destroying an organization’s or nation’s infrastructure, such as disrupting a nation’s power supply or communication lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Non-Malicious Insider Threat?

A

A good intended employee who compromises security through negligence or ignorance
(those 90%+ people who drive you crazy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what does https stand for?

A

Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following does not help create a strong password?
Avoiding reusing passwords
Avoiding names of family members, pets, sports teams
Using special characters, numbers, upper and lower case letters
Only allowing a limited number of password guesses
All help create a strong password

A

All help create a strong password

30
Q

Conventional wisdom states the life span of hard drive is

A

3-5 years

31
Q

Can a trojan horse virus self-replicate/infect files?

A

No

32
Q

What does creating a backdoor mean?

A

Someone taking control of your computer

33
Q

how does a firewall protect you?

A

by analyzing the information leaving and entering the network and then blocks unauthorized or suspicious content

34
Q

What are file permissions?

A

rules that specify what can and cannot be done to a file

35
Q

what is version control?

A

the management of changes to file

36
Q

what are checksums?

A

unique signature of file contents

37
Q

In order from center to outer, what is the onion model?

Hint: SD/R;E;P;F/IPS/PI;PS.

A

sensitive data/resources; encryption; permissions; firewalls, IPS, packet inspections; physical security.

38
Q

what does html stand for?

A

Hyper-Text Markup Language

39
Q

Is html a programming language? why or why not?

A

No.
Doesn’t calculate totals
Doesn’t validate forms
Doesn’t access databases

40
Q

What is the difference between the internet and the world wide web?

A

The internet is a global system of interconnected computers and networks.
The WWW is a network of interlinked web pages (a.k.a. “hypertext documents”)

41
Q

Who forces browser makers to adhere to standards?

A

Nobody other than “the market”

42
Q

What does URL stand for?

A

Uniform Resource Locator

43
Q

What does FTP stand for? What is it?

A

File transfer protocol.

Protocol for transferring files over the internet

44
Q

Html tags are called

A

elements

45
Q

What does CSS stand for?

A

Cascading Style Sheets

46
Q

What is metadata?

A

data about the page (in css)

47
Q

If the body style set font-size to 14 pt., the p style set font-size to 12 pt., the p.contact style set font-size to 18 pt., and the .subHeading style set font-size to 11 pt., what would the font-size be for the email address?

A

it would be 11pt because the .subHeading style is nested closest to the text.

48
Q

What are the 4 parts of the box model and what area do they describe?

A

Margin. The margin clears an area around the border. Margins have no background color and are always transparent.
Border. The border goes around the padding and content. To make the border visible, you must define the “border-style” property.
Padding. Padding clears an area around the content area.
Content. The content area is where text and images occur.

49
Q

What if you specified a background color for the tag as well as a <p> tag? Which would show up behind the paragraph?

A

the color specified for the <p> tag would show up over the tag because it is closer to the content, i.e. nested inside of the tag

50
Q

What is the advantage of using an external (versus internal) stylesheet?

A

Most importantly, the external stylesheet allows you to reuse your styles across ANY page on your site which contains a tag pointing to that stylesheet.

51
Q

is the href value in the tag an absolute or relative reference?

A

it’s relative because it doesn’t include the full path from website URL to styles.css file. However, you can use either an absolute or relative reference for stylesheets just like the <a> tag.</a>

52
Q

What are the 3 elements of the quality constraint triangle?

A

Time, cost, scope

53
Q

What does COTS stand for and what is it?

A

Commercial off the shelf.

Buy a ready made solution

54
Q

What is the agile system development method?

A

“quick” & “flexible”

Small projects delivered quickly & frequently; daily collaboration with users

55
Q

What does RAD stand for and what is it?

A

Rapid Application Development (RAD)

Rapid prototyping; interactive user involvement

56
Q

What does XP stand for and what is it?

A

Extreme programming

Tiny manageable phases; iterate with user feedback

57
Q

What is the success rate for the waterfall method?

A

10%

58
Q

What is the biggest problem with the waterfall methodology?

A

it assumes users can specify all business requirements in advance

59
Q

The primary difference between the waterfall and agile methodologies is that

A

agile divides its phases into iterations with user feedback

60
Q

What are the 7 phases to the waterfall method?

A

Planning, Analysis, Design, Development, Testing, Implementation, Maintenance. PADDTIM

61
Q

The following description describes which phase of the waterfall method?
Select the system project (strategic)
Assess project feasibility
Produce Project plan (Project Management)
Assign Team members, Develop Schedule (milestones)
Choose methodology
(COTS, Waterfall, RAD, Extreme Programming, Agile)
Probably use PM software: PERT, Gantt (“MS Project”)
Economical
Do benefits exceed costs? (e.g. ROI)
Technical
Is technology available - are we up to it?
Operational
Can our organization operate it?
Legal
Does it meet all regulations and laws?
Scheduling
Is the implementation schedule practical? Have we allowed time to build, test, train, etc.?

A

Planning

62
Q

The following description describes which phase of the waterfall method?
Collect/Analyze Data: Study the current system
Determine business/ customer requirements
Write requirements definition document
Sign Off

A

analysis

63
Q
The following description describes which phase of the waterfall method?
Design the IT infrastructure
Hardware
Software
Design the System Components (details)
Screen layouts; reports; procedures
Program logic
Database structure (data models/ERDs)
A

Design

64
Q

The following description describes which phase of the waterfall method?
Physical Implementation
Construct the physical infrastructure (power, AC, etc.)
Purchase/Install Hardware and Software
Write the programs
Structure & Build the databases

A

Development

65
Q

The following description describes which phase of the waterfall method?
Develop test conditions
Types of Testing
Unit – Does the component work as specified?
Application/System – Will components work together?
Backup/Recovery – Will it restart after disaster or failure?
Documentation – Are instructions accurate and helpful?
Integration – does it work with other systems?
Regression – are other functions still working?
User Acceptance Test (UAT) – Does the system satisfy user needs?

A

Testing

66
Q
The following description describes which phase of the waterfall method?
Complete detailed user documentation
Choose the conversion method 
Prepare users (Train on new system)
Convert/start new system
Get user acceptance
A

Implimentation

67
Q
The following description describes which phase of the waterfall method?
Implement backup procedures
Help users, fix problems, Optimize
Types of maintenance:
Adaptive, Corrective, Perfective, Preventative.
Carefully Manage Change: 
Change Control Board (CCB)
Also part of implementation
A

Maintenance

68
Q

Describe the 4 conversion techniques

A

Direct (Plunge) conversion: Switch from the old system to the new one “overnight”
Parallel conversion: Avoids some risk; run the old system until the new one is activated and working.
Phased conversion: Activate a new system one module at a time.
Pilot conversion: Activate and test the new system in one branch of an organization

69
Q

What is the most expensive part of the waterfall method?

A

Maintenance

70
Q

What are the 5 types of feasibility in planning?

A
TELOS
Technical
Economic
Legal
Operational
Scheduling
71
Q

What are the 4 types of testing?

A
UISUA
Unit
Integration
System
User acceptance