Questions of the Day Flashcards

1
Q

What document is important to ensure that an employee can not file a civil privacy suit against their employer?

A

Reasonable Expectation of Privacy (REP) Waiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the things missing from a hot site?

A

Data and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ proves to be a useful approach to identifying failures that can take place within complex environments and systems. In this method, each situation has the potential to cause a negative effect is added to the structure as a series of logic expressions

A

Fault tree Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Recovery Time Objective (RTO) usually deals with getting the infrastructure and systems back up and running. What metric is commonly used to deal with restoring data, testing processes, and then making everything live for production?

A

Work Recovery Time (WTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between best evidence and direct evidence?

A

Best evidence is most reliable (such as a signed document) – direct evidence can prove a fact by itself without supporting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A fault tree model lays out potential negative effects how?

A

As a structure with negative effect added as a series of logic expressions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What objective usually deals with getting the infrastructure and systems back up and running?

A

Recovery time Objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When you see “Administrative, Operation, Technical” you should think what sector of systems?

A

Federal information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you see “Administrative, Physical, Technical” you should think what sector of systems?

A

Private sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What java clause is critical for error handling

A

try…catch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TRUE/FALSE - The main purpose of a code repository is to store the source files used in software development in a centralized location that allows for secure storage.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ consist of shared code objects that perform related functions

A

Libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Developers wishing to sign their code must have a ____

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What software methodology uses an iterative process?

A

Spiral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The DevOps model prioritizes development efforts over operational tasks

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What character is essential for a SQL injection attack?

A

Apostrophe ‘

17
Q

What type of attack seeks to write data to areas of memory reserved for other purposes?

A

Buffer overflow

18
Q

TRUE/FALSE - Sandbox execution is not a significant risk with browser add-ons and extensions

A

TRUE

19
Q

What is the last stage in code testing?

A

User Accessibility Testing (UAT)

20
Q

TRUE/FALSE - Security teams should conduct regular testing of acquired software

A

TRUE

21
Q

What is the mnemonic for the software development life cycle?

A

Re Do The Damn Test Right

22
Q

What are the stages of the software development lifecycle?

A

Requirements, Design, Develop, Test, Release

23
Q

What is the mnemonic for the system development life cycle?

A

Information Assurance Is Out Dated

24
Q

What are the stages of system development life cycle?

A

Initiate, Acquire, Implement, Operations, Disposal

25
Q

Statistical behavior-based engines are not a component of what type of system?

A

Expert system

26
Q

Debugging a program without executing or compiled is what kind of analysis?

A

Static analysis

27
Q

TRUE/FALSE - Object oriented databases are more dynamic than relational databases, and the objects contain the procedures within them.

A

TRUE

28
Q

In terms of AES, S-Boxes are used how during the encryption process?

A

Substitution

29
Q

A dumb terminal that broadcasts requests to find its network configurations and operating system when booting up is using what protocol?

A

Reverse Address Resolution Protocol (RRARP) - Enables devices with MAC to find their IP info

30
Q

Kennedy-Kassembaum act is also known as what?

A

HIPAA

31
Q

A system with disk shadowing does what?

A

Writes to two different disks simultaneously

32
Q

What is the difference between disk duplexing and disk shadowing?

A

Disk duplexing has two controllers, not disk shadowing

33
Q

What is the most important goal of disaster recovery?

A

Protect human life

34
Q

What type of law punishes individuals with financial restitution instead of with jail penalties?

A

A tort, or civil law

35
Q

Why was Rijandael chosen over El Gamal for AES in 1997?

A

Rijandael uses a symmetric block algorithm, while El Gamal uses assymetric

36
Q

What is a beaconing functionality in a token passing ring do?

A

Excludes a computer from a ring