IS3340 CHAPTER 12 Flashcards
Computer software designed to allow users to perform specific tasks is called ___?
APPLICATION SOFTWARE
An integrated collection of software programs that are used to manage many aspects of a business, including financials, human resources, assets, and business process is called ___?
ENTERPRISE RESOURCE PLANNING (ERP)
A popular protocol used to transfer files from one computer to another is called ___?
FILE TRANSFER PROTOCOL (FTP)
A secure application layer protocol used to transfer encrypted content between Web browsers and Web servers. It encrypts traffic by sending messages over SLS/TLS and is called ___?
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
An attack in which the attacker is located between a client and a server and intercepts traffic flowing back and forth between the two computers. The attacker can view or modify data that is transmitted in the clear and is called ___?
MAN-IN-THE-MIDDLE
Adding more authority to the current session than the process should possess is called ___?
PRIVILEGE ESCALATION
A statement that accesses data in a database is called ___?
QUERY
The act of masquerading as another identity is called ___?
SPOOFING
An attack that adds SQL statements to input data for the purpose of sending commands to a database management system is called ___?
SQL INJECTION
A computer language for accessing data in a database is called ___?
STRUCTURED QUERY LANGUAGE (SQL)
An option in several database management systems that encrypts all data in the database without any user or application action required is called ___?
TRANSPARENT DATA ENCRYPTION (TDE)
A character string used to identify the location and name of a resource on the Internet is called ___?
UNIFORM RESOURCE LOCATOR (URL)
A computer that follows the instructions sent from another computer is called a ___?
ZOMBIE
- The main focus when security application software is confidentiality.
TRUE OR FALSE
FALSE
- Which type of application attack attempts to add more authority to the current process?
- Privilege spoofing
- Identity escalation
- Privilege escalation
- Identity spoofing
Privilege escalation