IS3340 CHAPTER 12 Flashcards

1
Q

Computer software designed to allow users to perform specific tasks is called ___?

A

APPLICATION SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An integrated collection of software programs that are used to manage many aspects of a business, including financials, human resources, assets, and business process is called ___?

A

ENTERPRISE RESOURCE PLANNING (ERP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A popular protocol used to transfer files from one computer to another is called ___?

A

FILE TRANSFER PROTOCOL (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A secure application layer protocol used to transfer encrypted content between Web browsers and Web servers. It encrypts traffic by sending messages over SLS/TLS and is called ___?

A

HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack in which the attacker is located between a client and a server and intercepts traffic flowing back and forth between the two computers. The attacker can view or modify data that is transmitted in the clear and is called ___?

A

MAN-IN-THE-MIDDLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adding more authority to the current session than the process should possess is called ___?

A

PRIVILEGE ESCALATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A statement that accesses data in a database is called ___?

A

QUERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The act of masquerading as another identity is called ___?

A

SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attack that adds SQL statements to input data for the purpose of sending commands to a database management system is called ___?

A

SQL INJECTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A computer language for accessing data in a database is called ___?

A

STRUCTURED QUERY LANGUAGE (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An option in several database management systems that encrypts all data in the database without any user or application action required is called ___?

A

TRANSPARENT DATA ENCRYPTION (TDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A character string used to identify the location and name of a resource on the Internet is called ___?

A

UNIFORM RESOURCE LOCATOR (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A computer that follows the instructions sent from another computer is called a ___?

A

ZOMBIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. The main focus when security application software is confidentiality.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which type of application attack attempts to add more authority to the current process?
  2. Privilege spoofing
  3. Identity escalation
  4. Privilege escalation
  5. Identity spoofing
A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following is the best first step in securing application software?
  2. Install all of the latest patches
  3. Harden the operating system
  4. Configure application software using least privilege
  5. Perform penetration tests to evaluate vulnerabilities
A

Harden the operating system

17
Q
  1. A ___ is an attractive target because it is the primary client of Web applications.
A

Web browser

18
Q
  1. Why are ActiveX controls potential security risks?
  2. Active X controls potential security risks
  3. Active X controls can contain malware and run on the server
  4. Active X controls require that you divulge sensitive authentication details
  5. Active X controls are outdated and generally used by older Web applications
A

Active X controls potential security risks

19
Q
  1. Enabling secure connections ensures email messages are encrypted between sender and recipient.
    TRUE OR FALSE
A

FALSE

20
Q
  1. Which of the following is a simple step to make email clients more secure?
  2. Use EFS/BitLocker to store email messages on the server
  3. Install third party message encryption
  4. Turn off message preview
  5. Remove email clients and use server-based email access
A

Turn off message preview

21
Q
  1. Which of the following steps can increase the security of all application software?
  2. Install anti-malware software
  3. Use whole disk encryption on client workstations
  4. Run SCW on workstations
  5. Require an SSL/TLS for connections to a Web server
A

Install anti-malware software

22
Q
  1. You use Windows server roles to configure each Windows server computer to perform only one task.
    TRUE OR FALSE
A

FALSE

23
Q
  1. A URL can contain commands the Web server will execute.

TRUE OR FALSE

A

TRUE

24
Q
  1. How do you install IIS on a Windows Server 2008 R2 computer?
  2. Purchase IIS and install it
  3. Download IIS for free and install it
  4. Add the Web Server (IIS) role to a server
  5. Install IIS from the Windows install DVD
A

Add the Web Server (IIS) role to a server

25
Q

12.A ___ is any statement that accesses data in a database.

A

Query

26
Q
  1. ___ encrypts all data in a database without requiring user or application action.
A

Transparent Dat Encryption (TDE)

27
Q
  1. SQL Injection attacks are only possible against popular Microsoft SQL Server databases.
    TRUE OR FALSE
A

FALSE

28
Q
  1. Is requiring secure connections between your Web server and your application server worth the overhead and administrative effort?
  2. No, because both the Web server and application server are inside your secure network
  3. Yes, because your Web server is in the DMZ and is Internet-facing
  4. No, because secure connections between high volume servers can dramatically slow down both servers
  5. Yes, because your application server is in the DMZ and is Internet-facing
A

Yes, because your Web server is in the DMZ and is Internet-facing