Misc Architecture and Design Flashcards
Kevin knows that regression testing is necessary but wants to prevent old versions of code from being re-inserted into new releases. What process should he use to solve this problem?
Version numbering - Kevin should implement a version numbering scheme and make sure that the proper current version of software components is included in new releases and deployments. Developers can still manually reintroduce old code, but version numbering helps to ensure that you have a current version in use
Differential backup vs incremental backup
Differential backups backup all of the changes since the last full backup. An incremental backup backs up all changes since the last incremental backup.
RAID 5
RAID level 5 is disk striping with distributed parity. It can withstand the loss of any single disk. Disk striping with distributed parity, can handle only one disk failing
RAID 0
RAID 0 is disk striping; it does not provide any fault tolerance. If one drive fails, you lose your data. Disk striping, which cannot handle disk failure,
RAID 1
RAID 1 is mirroring. It does protect against the loss of a single disk but not with distributed parity
RAID 3
RAID 3 is disk striping with dedicated parity. This means a dedicated drive containing all the parity bits. Byte-level striping with dedicated parity and cannot tolerate more than a single drive failing
Community cloud
A community cloud presents a compromise measure. Community clouds are semi-private. They aren’t accessible to the general public but only to a small community of specific entities
Elliptic curve encryption
Allows the use of a shorter key for the same strength that an RSA key would require, reducing the computational overhead required to encrypt and decrypt data
What is the point where false acceptance rate and false rejection rate cross over in a biometric system?
CER. The crossover error rate (CER) is the point where the FAR (false acceptance rate) and the FRR (false rejection rate) cross over. CER provides a means of comparing biometric systems based on their efficiency, with a lower CER being more desirable
Stored procedure
Stored procedures are widely used in many database management systems to contain SQL statements. The database administrator (DBA), or someone designated by the DBA, creates the various SQL statements that are needed in that business, and then programmers can simply call the stored procedures.
Protected Cable Distribution
Protected cable distribution uses such controls as electrical, electromagnetic, and even acoustic or air pressure sensors to ensure that cables and distribution infrastructure are not accessed, allowing sensitive information to be transmitted in unencrypted form. The U.S. government identifies three options: hardened carrier, alarmed carrier, and continuously viewed protected distribution systems
Bcrypt
A key-stretching algorithm
Fog (edge) computing
a term coined by Cisco to describe cloud computing at the edge of an enterprise network. The more common term for this is edge computing, but you may encounter both terms. Fog implementations handle significant amounts of computation, communication, and storage activities locally, while also connecting to cloud services to perform some of the work.
Transit gateways
transit hubs used to connect VPCs (virtual private clouds) to on-premises networks
Homomorphic encryption
can perform computations on the ciphertext without access to the private key that the ciphertext was encrypted with. When the computations are completed, the results are the same as if those computations had been performed against the original plain text.