Sample Test Questions Domain 8 Flashcards

1
Q

___ is used when databases are clustered to provide high fault tolerance and performance

A

Online transaction processing (OLTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

in database design, the ACID test stands for:

A

Atomicity, Consistency, Isolation, Durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ in database design refers to dividing transactions into units of work ensuring that all modifications take effect or none take effect

A

Atomicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ in database design means that a transaction must follow the integrity policy developed for that particular database and ensure all data is consistent in the different databases

A

Consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ in database design means that transactions execute in isolation until completed, without interacting with other transactions. The results of the modification are not available until the transaction is completed

A

Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ in database design means that once the transaction is verified as accurate on all systems, it is committed, and the databases cannot be rolled back

A

Durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the ___ database model, records and fields are related in a logical tree structure. Parents can have one child, many children, or no children

A

hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an ___ database, when an application queries for data, it receives both the data and the procedure

A

object-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ testing involves testing an individual component in a controlled environment to validate data structure, logic, and boundary conditions

A

Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ development involves the use of independent and standardized modules

A

Component-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Java ___ converts the bytecode into machine-level code that the processor on the particular system can understand

A

Virtual Machine (JVM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ integrity guarantees that the tuples are uniquely identified by primary key values

A

Entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ___ is an XML-based protocol that was created to replace Remote Procedure Calls (RPCs) and allow applications running on different operating systems to exchange information over the Internet

A

Simple Object Access Protocol (SOAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP was not designed to work with ___, but SOAP was designed to work with HTTP

A

Remote Procedure Calls (RPCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is the best first step for developers to take to identify the security controls that should be coded into a software project

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___, or persistent XSS vulnerability, is targeted at websites that allow users to input data that is stored in a database or other location, such as a forum or message board. These types of platforms are among the most commonly plagued by XSS vulnerabilities.

A

second-order vulnerability

17
Q

nonpersistent XSS vulnerabilities, also referred to as ___, occur when an attacker tricks the victim into opening a URL programmed with a rogue script to steal the victim’s sensitive information (such as a cookie)

A

reflected vulnerabilities

18
Q

in ___ cross-site scripting (XSS) attacks, which are also referred to as local cross-site scripting, document components of websites such as form fields and cookies can be referenced through JavaScript and modified

A

document object model (DOM)–based

19
Q

___ is the most recent evolution in antimalware detection, it allows suspicious code to execute within the operating system and watches its interactions looking for suspicious activities

A

Behavior blocking

20
Q

In object-oriented programming objects need to be able to communicate with each other, and this happens by using ___ that are sent to the receiving object’s application program interface (API)

A

messages

21
Q

in a covert storage channel, processes are able to ___ through some type of storage space on the system

A

communicate

22
Q

A ___ is used to recover data if there is a system failure or problem during a transaction

A

checkpoint

23
Q

___ is the international standard that provides guidance to organizations in integrating security to the processes used for managing their applications

A

ISO/IEC 27034

24
Q

The ___ is a nonprofit organization made up of an international group of experts, industry practitioners, and organizational representatives who produce open-source and widely agreed-upon best-practice security standards for the World Wide Web

A

Web Application Security Consortium (WASC)

25
Q

___ provides a machine-readable description of the specific operations provided by a specific web service

A

Web Services Description Language (WSDL)

26
Q

___ provides a method for web services to be registered by service providers and located by service consumers

A

Universal Description, Discovery and Integration (UDDI)

27
Q

When changes take place to a software product during its development life cycle, a ___ system can be put into place that allows for change control processes to take place through automation.

A

software configuration management (SCM)

28
Q

a ___ can help ensure that corporate change control policies and procedures are adhered to and should log all code accesses as a detective control as well. But foremost, it can help ensure that code is only ever accessed by an authorized developer

A

code versioning system (CVS)

29
Q

the best way to ensure that newly acquired software is secure and functional is by ___

A

black-box testing it in a lab

30
Q

a ___ can manifest as sporadic ICMP traffic both incoming and outgoing

A

rootkit

31
Q

___ is a systematic approach to deliberately regulating the changing nature of projects.

A

change management

32
Q

___ is the process of controlling the specific changes that take place during the life cycle of a system.

A

change control

33
Q

The security posture of ___, ___, and ___ are the three overarching concerns for any software development environment

A

development platforms;
code repositories;
software configurations