Test Study 3 Flashcards
What is the difference in a patent and a trade secret.
A patent is legal protection, however what you are protecting is now made public. A trade secret is kept hidden and the only legal protection is from theft.
Which application tier involves how an application functions?
Tier 2, application logic
What identity method is commonly used by large providers, such as Facebook?
OAuth
Which step of the DREAD model talks about how bad an attack may be?
Damage
What is a trade secret?
A formula, process, or design that is generally not known by others and has viable commercial use.
What are 3 types of backups?
Full backup
Differential
Incremental
What part of the RMF involves ongoing review and updating of controls?
Monitor and Update
Which step of the DREAD model talks about how easy it is to identify the threat?
Discoverability
What two phases of the penetration test loop until the test is completed?
Discovery and Attack
What is the term for hiring a person to perform activities normally performed by a computer?
HumBot
Which ‘due’ deals with research and planning?
Due diligence
A computer is given an IP of 172.17.5.20, what caused this?
RFC1918
What is a differential backup?
Backup the changes since the last full backup.
Which application tier involves HTML?
Tier 1, presentation tier
What US agency upholds the GDPR?
US Department of Commerce
What is 802.5
Token Ring
What happens during the assess step of the RMF?
Having an independent assessor test the controls.
What is a generational fuzzer?
An intelligent fuzzer that has an understanding of the file format or protocol.
What is the DREAD model?
Damage Reproducibility Exploitability Affected Users Discoverability
What are the three application tiers?
Tier 1 - Presentation and organization, HTML and Javascript
Tier 2 - Application logic, functions, programming, C#, C++, Java
Tier 3 - Data tier, databases
What can obfuscate a message that works on words or entire blocks of words?
Code
What is something that XACML does NOT provide?
Authentication
What is OVAL?
Open Vulnerability Assessment Language
Open standard for identifying vulnerabilities and not tied to any proprietary architecture.
Which fuzzer is only ‘smart’
Generational
What business model has four levels?
TOGAF
What is an incremental backup?
Backup the changes since the last backup, full or incremental.
What permissions are around Open Source?
Permission to use the original source code design and content in any way.
What is NoSQL?
A database type created to address the limitations and vulnerabilities associated with relational databases.
What part of the RMF involves making risk determinations based on risk assessments?
Authorize
What is Graph?
A NoSQL implementation that organizes information as nodes, relationships, and properties.
What can be implemented as a policy enforcement point between users and a cloud provider?
CASB