Mod A Flashcards
Also known as encapsulation, a characteristic of object-oriented programming (OOP) and used to isolate objects and subjects from each other
data hiding
Processors typically support 2 states:
supervisor aka kernel mode
problem aka user mode
In ____ state, the processor is operating at the highest privileges which means running process has access to all info on that system
supervisor
In ____ state, the processor can access info that is has been granted the privileges to access
problem
The process of logically segregating functions of hardware and software so that changes in the processes do not affect the other layers.
layering
In a brute force attack, the attacker has access to only the ______ text
cipher
In a known plaintext attack, the attacker has access to _____ text
both plain and cipher text
A type of known plain text attack in which multiple sets of plaintext and corresponding ciphertext can be analyzed for patterns or trends which can help extract the key
Linear cryptanalysis
A legal liability concept that requires an organization review its practices to ensure that protection requirements are met.
due diligence
Practicing due diligence can help create a defense against _____
negligence
A legal liability concept that defines the minimum level of info protection that a business must achieve
due care
The process of measuring business practices against the judgement of any reasonable individual is also known as the ______ rule
prudent man
This law was created in 1974 to govern the way federal agencies use and distribute personal information of U.S. citizens. It states that agencies cannot disseminate personal info without the permission of the individual. U.S. census and labor statistics are exempt.
U.S. Privacy Act of 1974
Created to provide a framework for how info traverses international borders. This guideline contains the following principles:
collection limitation
data quality
purpose specification
use limitation
security safeguards
openness principle
individual participation
accountability
OECD Guidelines
A link-state routing protocol that learns the entire network topology for the area using cost
OSPF
A distance-vector routing protocol that is only aware of directly connected neighbor routers and uses hop count as a metric
RIP
____ routing protocols send updates only when the network topology changes.
link-state
____ routing protocol sends entire content of the routing table to all neighbor routers every 30 seconds by default whether or not a topology change occurs
RIP
Data stored in a cloud is considered data at ___ and is not considered in transit until accessed over the internet
rest
Data stored in a SAN is considered data at ____-
rest
DNS servers use a ______ to store information about how to resolve IP addresses to domain names
hierarchical database
A ___ file is a flat file database that stores domain name resolution info locally. When DNS is unavailable, the computer might be able to resolve IP addresses of domain names by looking up info stored on this file.
hosts
A ____ database can be accessed, read, and written to by using code written in OOP language
Object-oriented
This database created relationship between records in tables by using primary keys.
relational