study 5 Flashcards

1
Q

“ACID” property in DBMS stands for?

A
  1. Atomicity
  2. Consistency
  3. Isolation
  4. Durability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Atomicity

A

requires that each transaction is “all or nothing”:

if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Consistency

A

ensures that any transaction will bring the database from one valid state to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Isolation

A

ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other.

isolation is the main goal of concurrency control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Durability

A

means that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Final Acceptance Testing two major parts:

A
  1. Quality Assurance Testing QAT)
    focusing on the technical aspect of the application
  2. User acceptance testing: UAT)
    focusing on functional aspect of the application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The testing of an individual program or module.

It uses set of test cases that focus on control structure of procedural design.

A

Unit Testing

These tests ensures internal operation of the programs according to the specification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A series of tests designed to ensure that modified programs, objects, database schema, etc , which collectively constitute a new or modified system, function properly.

A

System Testing

These test procedures are often performed in a non-production test/development environment by software developers designated as a test team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hardware or software test that evaluates the connection of two or more components that pass information from one area to another.

A

Interface or integration testing:

The objective it to take unit tested module and build an integrated structure dictated by design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a Protocol that supports the creation of secure virtual private dial-up networks over the Internet.

A

L2F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

three part of ipsec

A
  1. AH
  2. ESP
  3. IKE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what part of IPSEC not work NAT

A

(AH) Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the two sub protocols of IKE

A
  1. Oakley = use Diffie Hellman for keys agreement

2. ISAKMP = manage the keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SA is setup by what sub protocols of IKE

A

ISAKMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RPC is at what level of the ISO model?

A

5 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Errors in critical modules are detected earlier in what software testing?

A

The bottom-up approach

17
Q

message digest is another word for

A

hash

18
Q

A Pseudo flaw is?

A

An apparent loophole deliberately implanted in an operating system program as a trap for intruders.

19
Q

An identity-based access control is a type of ? Access Control that is based on an individual’s identity.

A

Discretionary Access Control (DAC)

20
Q

Physically securing backup tapes from unauthorized access is obviously a security concern and is considered a function of the:

A

Security Operations Domain.

21
Q

In IPSec, if the communication is to be gateway-to-gateway or host-to-gateway

A

Tunnel mode

22
Q

FCOE is a protocol that rides over Ethernet like iSCSI but is not itself routable

A

FCOE - Fiber Channel over Ethernet

23
Q

computer forensics:

To prevent sought-after information from being altered

A

Data Protection

24
Q

computer forensics:

All information and data required should transferred into a controlled location;

A

Data Acquisition
Each device must be checked to ensure that it is write protected. This may be achieved by using a device known as write blocker.

25
Q

computer forensics:
is a process that allows one to obtain bit-for bit copy of a data to avoid damage of original data or information when multiple analyses may be performed.

A

Imaging

26
Q

computer forensics:

This process consist of identification and selection of data from the imaged data set.

A

Extraction

27
Q

computer forensics:
is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.

A

Interrogation

28
Q

computer forensics:
This process converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.

A

Investigation/ Normalization

29
Q

Which type of lock uses a numeric keypad or dial to gain entry?

A

Cipher lock

30
Q

What are the criteria which are often called the five rules of evidence:

A
1. authentic
,2.accurate
3. complete
4. convincing
 5. Admissible.
31
Q

Intellectual property is divided into two categories:

A

Industrial and Copyright

32
Q

A Public Key Infrastructure (PKI) provides what? (5)

A
  1. confidentiality,
  2. access control,
  3. integrity,
  4. authentication
  5. non-repudiation.
33
Q

the 3 steps required for a Kerberos session?

A
  1. Principal P1 authenticates to the Key Distribution Center (KDC),
  2. principal P1 receives a Ticket Granting Ticket (TGT),
  3. and principal P1 requests a service ticket from the Ticket Granting Service (TGS) in order to access the application server P2.
34
Q

? is the variation in the time of arrival at the receiver of the information.

A

Jitter

35
Q

is the delay between the sender and the receiver decoding it

A

Latency

36
Q

The 3 part of a relational model?

A
  1. Structural:
    The model structure is described in terms of relations , tuples , attributes and domains .
  2. Manipulative:
    Defines how the data in the model will be accessed and manipulated.
  3. Constraints:
    The constraints determine valid ranges and values of data to be included in the model.
37
Q

In the Bell-LaPadula model, the Star-property is also called:

A

The confinement property