Lecture 6 Flashcards
Data and Application Security
______ allows a single user to harness the computing power of one or more remote systems to achieve a single goal.
A. distributed computing
B. centralized computing
C. administered computing
A. distributed computing
This threat attached itself to a legitimate OS, file or application and performs unwanted actions. It spreads through infected media.
A. Trojan
B. Worm
C. Virus
C. Virus
What is a Trojan Horse threat?
Malicious code that is disguised as a harmless program.
A ____ is a threat that is dormat until a specific trigger
logic bomb
This type of threat is self-propagating.
A. Trojan
B. Worm
C. Virus
B. Worm
______ code objects sent from a server to a client to perform some action. They are self-contained and operate independently of the server.
Applets
_____ is intelligent code objects performing actions on behalf of a user.
A. applet
B. agent
C. COM
B. agent
The object management group (OMG) created ______. In this model a broker invokes the object to keep details transparent to the client
Common Object Request Broker Architecture (CORBA)
Microsoft created ____ which allows users to embed components from one app into another
Component Object Model (COM)
List the 4 characteristics of a relational database.
atomicity
consistency
isolation
durability
____ is where all or none of the instructions in a transaction are executed.
A. atomicity
B. consistency
C. isolation
D. durability
A. atomicity
_____ is where all transactions must follow the database rules.
A. atomicity
B. consistency
C. isolation
D. durability
B. consistency
_____ means that all transactions must operate independently.
A. atomicity
B. consistency
C. isolation
D. durability
C. isolation
_____ ensures that transactions committed to the database are preserved.
A. atomicity
B. consistency
C. isolation
D. durability
D. durability
In database a ____ is a SQL statement used to present data to a user as if it were a table. It can be used as a security tool.
View
A ______ is an interface for applications to communicate with different databases.
Open Database Connectivity (ODBC)
The collection of numerous non-sensitive items combined to derive more sensitive information.
A. Combination
B. Sniffing
C. Aggregation
D. Inference
C. Aggregation
Combining several pieces of information to gain access to information that should be classified at a higher level.
A. Combination
B. Sniffing
C. Aggregation
D. Inference
A. Combination
B. Sniffing
C. Aggregation
D. Inference
What is a data warehouse?
storage of large amounts of information from a variety of databases for use with specialized analysis techniques
A ____ channel is the transmission of sensitive data that shouldn’t exist/not documented.
covert
____ procedures ensure that security controls are properly implemented throughout the lifecycle of the system.
Assurance
What is a limit check?
It limits the type, format, length, or range of input information.
The ____ SDLC model is a series of iterative steps. Each phase is completed before the next begins.
A. Spiral
B. Waterfall
C. IDEAL
D. Agile
B. Waterfall
The ____ SDLC model allows for multiple iterations of an iterative style process.
A. Spiral
B. Waterfall
C. IDEAL
D. Agile
A. Spiral
The ____ SDLC model is a process of quickly developing software to make is available quicker.
A. Spiral
B. Waterfall
C. IDEAL
D. Agile
D. Agile
The ____ SDLC mode has 5 phases: Initializing, Diagnosing, Establishing, Acting, Learning.
A. Spiral
B. Waterfall
C. IDEAL
D. Agile
C. IDEAL
_____ is the process of controlling the versions of software used throughout the environment and tracks changes to software configurations.
configuration management
This testing examines the internal logical structures of a program and steps through the code line by line, analyzing the program for potential errors.
A. Gray-box testing
B. Black-box testing
C. White-box testing
C. White-box testing
This testing is where a tester has access to the source code but does not analyze the inner workings of the program.
A. Gray-box testing
B. Black-box testing
C. White-box testing
A. Gray-box testing
In this testing there is no access to the internal code. The output is inspected.
A. Gray-box testing
B. Black-box testing
C. White-box testing
B. Black-box testing
_____ mechanisms ensure that each process has its own isolated memory space for storage of data and execution of application code
process isolation
______ is a technique that implements process isolation at the hardware level by enforcing memory access constraints
hardware segmentation
_____ is where the details of performing activities is hidden from the user.
Abstraction
Systems are authorized to process information at more than one security level even when not all users have clearance for all information processed by the system
A. Dedicated security mode
B. System-high security mode
C. Compartmented security mode
D. Multilevel security mode
D. Multilevel security mode
System are authorized to process only information that all users are cleared for
A. Dedicated security mode
B. System-high security mode
C. Compartmented security mode
D. Multilevel security mode
B. System-high security mode