Host, Data, & Application Security (Ch. 7) Flashcards

1
Q

Any sophisticated series of related attacks taking place over an extended period of time.

A

advanced persistent threats (APTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A method of software development meant to be rapid.

A

Agile development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Creating a fundamental, or baseline, security level.

A

baselining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data that is larger than what can be handled with traditional tools and algorithms.

A

Big Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of removing duplication in a relational database.

A

database normalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating system in a device, sometimes on a single chip.

A

embedded system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A method of testing that intentionally enters invalid input to see if the application can handle it.

A

fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of making a server or an application resistant to an attack.

A

hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of managing and provisioning computer datacenters through machine-readable definition files.

A

Infrastructure as Code (IaC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Devices that interact on the Internet, without human intervention.

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Datastores that do not use a relational structure.

A

NoSQL database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An online community that develops free articles, documentation, tools, and more on web application security.

A

Open Web Application Security Project (OWASP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Creating a version of an application that has only the bare minimum functionality so that it can be evaluated before further development.

A

prototyping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating in an isolated environment.

A

sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attacker with very minimal skills.

A

script kiddy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programming in a manner that is secure.

A

secure coding

17
Q

SQL statements written and stored on the database that can be called by applications.

A

stored procedures

18
Q

Subjecting a system to workloads that are extreme.

A

stress testing

19
Q

The language used by all relational databases.

A

Structured Query Language (SQL)

20
Q

A software development method that uses very well-defined sequential phases.

A

waterfall method

21
Q

A vulnerability that is unknown to the product vendor, and thus there is no patch for it.

A

zero-day exploit