study 5 Flashcards
“ACID” property in DBMS stands for?
- Atomicity
- Consistency
- Isolation
- Durability
Atomicity
requires that each transaction is “all or nothing”:
if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged.
Consistency
ensures that any transaction will bring the database from one valid state to another.
Isolation
ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other.
isolation is the main goal of concurrency control.
Durability
means that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors.
Final Acceptance Testing two major parts:
- Quality Assurance Testing QAT)
focusing on the technical aspect of the application - User acceptance testing: UAT)
focusing on functional aspect of the application.
The testing of an individual program or module.
It uses set of test cases that focus on control structure of procedural design.
Unit Testing
These tests ensures internal operation of the programs according to the specification.
A series of tests designed to ensure that modified programs, objects, database schema, etc , which collectively constitute a new or modified system, function properly.
System Testing
These test procedures are often performed in a non-production test/development environment by software developers designated as a test team
A hardware or software test that evaluates the connection of two or more components that pass information from one area to another.
Interface or integration testing:
The objective it to take unit tested module and build an integrated structure dictated by design
a Protocol that supports the creation of secure virtual private dial-up networks over the Internet.
L2F
three part of ipsec
- AH
- ESP
- IKE
what part of IPSEC not work NAT
(AH) Authentication Header
the two sub protocols of IKE
- Oakley = use Diffie Hellman for keys agreement
2. ISAKMP = manage the keys
SA is setup by what sub protocols of IKE
ISAKMP
RPC is at what level of the ISO model?
5 Session
Errors in critical modules are detected earlier in what software testing?
The bottom-up approach
message digest is another word for
hash
A Pseudo flaw is?
An apparent loophole deliberately implanted in an operating system program as a trap for intruders.
An identity-based access control is a type of ? Access Control that is based on an individual’s identity.
Discretionary Access Control (DAC)
Physically securing backup tapes from unauthorized access is obviously a security concern and is considered a function of the:
Security Operations Domain.
In IPSec, if the communication is to be gateway-to-gateway or host-to-gateway
Tunnel mode
FCOE is a protocol that rides over Ethernet like iSCSI but is not itself routable
FCOE - Fiber Channel over Ethernet
computer forensics:
To prevent sought-after information from being altered
Data Protection
computer forensics:
All information and data required should transferred into a controlled location;
Data Acquisition
Each device must be checked to ensure that it is write protected. This may be achieved by using a device known as write blocker.
computer forensics:
is a process that allows one to obtain bit-for bit copy of a data to avoid damage of original data or information when multiple analyses may be performed.
Imaging
computer forensics:
This process consist of identification and selection of data from the imaged data set.
Extraction
computer forensics:
is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.
Interrogation
computer forensics:
This process converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.
Investigation/ Normalization
Which type of lock uses a numeric keypad or dial to gain entry?
Cipher lock
What are the criteria which are often called the five rules of evidence:
1. authentic ,2.accurate 3. complete 4. convincing 5. Admissible.
Intellectual property is divided into two categories:
Industrial and Copyright
A Public Key Infrastructure (PKI) provides what? (5)
- confidentiality,
- access control,
- integrity,
- authentication
- non-repudiation.
the 3 steps required for a Kerberos session?
- Principal P1 authenticates to the Key Distribution Center (KDC),
- principal P1 receives a Ticket Granting Ticket (TGT),
- and principal P1 requests a service ticket from the Ticket Granting Service (TGS) in order to access the application server P2.
? is the variation in the time of arrival at the receiver of the information.
Jitter
is the delay between the sender and the receiver decoding it
Latency
The 3 part of a relational model?
- Structural:
The model structure is described in terms of relations , tuples , attributes and domains . - Manipulative:
Defines how the data in the model will be accessed and manipulated. - Constraints:
The constraints determine valid ranges and values of data to be included in the model.
In the Bell-LaPadula model, the Star-property is also called:
The confinement property