Lecture 6 Flashcards
Data and Application Security
______ allows a single user to harness the computing power of one or more remote systems to achieve a single goal.
A. distributed computing
B. centralized computing
C. administered computing
A. distributed computing
This threat attached itself to a legitimate OS, file or application and performs unwanted actions. It spreads through infected media.
A. Trojan
B. Worm
C. Virus
C. Virus
What is a Trojan Horse threat?
Malicious code that is disguised as a harmless program.
A ____ is a threat that is dormat until a specific trigger
logic bomb
This type of threat is self-propagating.
A. Trojan
B. Worm
C. Virus
B. Worm
______ code objects sent from a server to a client to perform some action. They are self-contained and operate independently of the server.
Applets
_____ is intelligent code objects performing actions on behalf of a user.
A. applet
B. agent
C. COM
B. agent
The object management group (OMG) created ______. In this model a broker invokes the object to keep details transparent to the client
Common Object Request Broker Architecture (CORBA)
Microsoft created ____ which allows users to embed components from one app into another
Component Object Model (COM)
List the 4 characteristics of a relational database.
atomicity
consistency
isolation
durability
____ is where all or none of the instructions in a transaction are executed.
A. atomicity
B. consistency
C. isolation
D. durability
A. atomicity
_____ is where all transactions must follow the database rules.
A. atomicity
B. consistency
C. isolation
D. durability
B. consistency
_____ means that all transactions must operate independently.
A. atomicity
B. consistency
C. isolation
D. durability
C. isolation
_____ ensures that transactions committed to the database are preserved.
A. atomicity
B. consistency
C. isolation
D. durability
D. durability
In database a ____ is a SQL statement used to present data to a user as if it were a table. It can be used as a security tool.
View