Total seminars Flashcards
What is the MAU in a token ring network?
A media access unit (MAU) is a standalone device that acts as an Ethernet transceiver when connecting network nodes in local area networks LAN). MAUs are used in token ring network topology, where network stations form a logical ring — that is, data passes from one device to another in a continuous circle.
How MAUs work
MAUs typically operate at the data link layer (also called layer 2) of the open systems interconnection (OSI) model. MAUs manage physical connections between network devices, ensuring that data is transmitted and received correctly.
Unlike in conventional ring topology, if one device on the token ring fails, MAUs can bypass it and forward the data to the next device in the ring.
Types of MAU
Passive: Passive MAUs operate without an external power source, which means they can extend the network in places without convenient power outlets. Passive MAUs rely on the physical properties of cables and network interface cards (NICs) for data transmission.
Active: Active MAUs require an external power source for operation. In addition to data transmission, active MAUs can provide other network services, like amplifying signals or managing collisions.
What is a system account?
A local system account is a user account that is created by an operating system during installation and that is used for operating system-defined purposes.
What is OCTAVE?
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a risk assessment methodology typically employed by small teams of representatives from both IT and business areas to conduct risk analysis. It was developed by the Computer Emergency Response Team (CERT) Coordination Center at Carnegie Mellon University.
What is a Java Virtual Machine?
The Java Virtual Machine (JVM) is platform independent and acts as a translator to run portable code. The JVM converts bytecode to the machine code that the processor on a particular system can understand.
What is a runtime environment?
A runtime environment (RTE) functions as a miniature operating system for the program and provides all the resources portable code needs.
What is bytecode?
Bytecode is intermediate code created by Java and is not processor specific, which makes the Java programming language platform independent. The Java Virtual Machine (JVM) converts the bytecode to the machine code that the processor on a particular system can understand.
How do you classify incidents?
A nondisaster is a disruption in service that has significant but limited impact on the conduct of business processes at a facility. The solution could include hardware, software, or file restoration.
A disaster is an event that causes the entire facility to be unusable for one day or longer. This usually requires the use of an alternate processing facility and restoration of software and data from offsite copies.
A catastrophe is a major disruption that destroys the facility altogether. This requires both a short-term solution, which would be an offsite facility, and a long-term solution, which may require rebuilding the original facility, and affects a business for weeks, months, or years.
A mishap is not one of the normal categorizations for a disaster; however, it may be a simple accident or other negative incident that does not qualify as a disaster. Depending upon its scope and severity, it may be considered a nondisaster.
How are synchronous and asynchronous transmissions different?
Synchronous network transmissions provide timing synchronization rules to govern how systems communicate with each other. It differs from asynchronous transmission in that it is more complex and costly, it has a robust error checking, and is used for high-speed, high-volume transmissions. It is considered more reliable since asynchronous communications do not provide a method for regulating timing.
Asynchronous network transmissions provide synchronization rules to govern how systems communicate with each other. It differs from synchronous signaling in that it is simpler and less costly, its parity bits are used for error control, and it is used for irregular transmission patterns. It does not use any type of timing synchronization to regulate communications flow. Because of the lack of timing synchronization, it is less robust and reliable.
Asynchronous communication devices, such as modems, are not synchronized in that the devices involved can send data at will, sending a sequence of bits framed with start and stop bits that are reassembled into data at the receiving end. Asynchronous transmissions do not use a timing signal. Synchronous communication devices, on the other hand, determine a synchronization scheme before data transmission.
Explain SPF vs DKIM vs DMARC
Sender Policy Framework (SPF) is an e-mail validation system designed to prevent e-mail spam by detecting e-mail spoofing by verifying the sender’s IP address. SPF allows administrators to specify which hosts are allowed to send e-mail from a given domain by creating a specific SPF record in DNS. Mail exchanges use DNS to check that mail from a given domain is being sent by a host sanctioned by that domain’s administrators.
The DomainKeys Identified Mail (DKIM) standard, codified in RFC 6376, allows e-mail servers to digitally sign messages to provide a measure of confidence for the receiving server that the message is from the domain it claims to be from.
The Domain-based Message Authentication, Reporting and Conformance (DMARC) system defines how domains communicate to the rest of the world whether they are using SPF or DKIM (or both). It also codifies the mechanisms by which receiving servers provide feedback to the senders on the results of their validation of individual messages.
What is the difference between Heuristic and Anomaly Based Detection?
Anomaly-based detection is similar to heuristic detection but examines behaviors exhibited after the code is executed; it does not look at the characteristics of the code before or during execution, as heuristic detection does, to determine if it is malicious.
What is the Facilitated Risk Analysis Process?
Facilitated Risk Analysis Process (FRAP) is a qualitative risk assessment methodology that focuses only on the systems that really need assessing, to reduce costs and time obligations. It stresses prescreening activities so that the risk assessment steps are carried out only on the item(s) that needs it the most. FRAP is intended to be used to analyze one system, application, or business process at a time.
What is OAuth and OIDC?
OAuth is an authorization framework and does not provide any authentication services; OpenID Connect (OIDC) is a simple authentication layer built on top of OAuth and handles authentication with third-party identity providers.
The authorization server is the system that keeps track of which clients are allowed to use which resources, and issues access tokens to those clients.
client is a process that requests access to a protected resource. Because this term describes the relationship of an entity with a resource provider in a client/server architecture, the “client” could actually be a web service (e.g., LinkedIn) that makes requests from another web service (e.g., Google).
The resource server controls the resource that the client is trying to access.
The resource owner is whoever owns a protected resource and is able to grant permissions for others to use it. These permissions are usually granted through a consent dialog box. The resource owner is typically an end user but could be an application or service.
In open-standards authorization framework that works between applications. It exchanges messages between the APIs of applications and creates a temporary token showing that access to the information or services provided by one application to the other is authorized.
What is XOR?
XOR is an operation that is applied to 2 bits and is a function commonly used in binary mathematics and encryption methods. When combining the bits, if both values are the same, the result is 0 (1 XOR 1 = 0). If the bits are different from each other, the result is 1 (1 XOR 0 = 1).
What are the steps of the SDLC process?
Project planning, requirements, design, coding, testing, deployment, maintenance
The requirements gathering phase is where requirements are formally gathered, including functional requirements (what the software must do) and performance requirements (how well it must do it).
The design phase of the software development life cycle (SDLC) involves determining how the software will meet its functional and performance requirements, in terms of included functions, mechanisms, and components.
During the development/acquisitions phase, software is actually programmed, if developed internally, or acquired, meaning it is commissioned or bought from another source.
The operation/maintenance phase involves implementing software after it has been accepted by the organization and putting it into operational use. Maintenance involves planned change management, updates, and so on.
What is the difference between software verification and validation?
Verification determines if the software product accurately represents and meets the specifications. After all, a product can be developed that does not match the original specifications, so this step ensures the specifications are being properly met. It answers the question, “Did we build the product right?”
Validation determines if the software product provides the necessary solution for the intended real-world problem.
What is jitter?
Irregularity in the arrival times of consecutive packets, which hurts voice and video communications.
What is line noise?
Random fluctuations in electrical-magnetic impulses that are carried along a physical medium.
What should you do during an M&A?
Depending on the terms of the divestiture, you should at least ensure that any vulnerabilities are mitigated to the maximum extent possible, to ensure a secure configuration and up-to-date patch management has been implemented on assets, which maintains and possibly increases the assets’ value. You should also ensure that any sensitive data is removed from the assets unless it is specifically part of the sale.
While it may be part of the terms of the sale to wipe all media in the assets, you likely do not wish to make sensitive data backups available to the new owners.
What is a cleanroom approach?
Cleanroom is a methodology that attempts to prevent errors or mistakes by following highly structured and formal methods of developing and testing. This approach is used for high-quality and mission-critical applications that will be put through a strict certification process.
What is the Joint Application Development methodology?
The Joint Application Development (JAD) methodology uses a team approach in application development in a workshop-oriented environment. This methodology is distinguished by its inclusion of members other than coders in the team.
What is the reuse methodology?
The reuse methodology approaches software development by using progressively developed code. Reusable programs are evolved by gradually modifying preexisting prototypes to customer specifications.
What is the exploratory methodology?
The exploratory methodology is used in instances where clearly defined project objectives have not been presented. Instead of focusing on explicit tasks, the exploratory methodology relies on covering a set of specifications likely to affect the final product’s functionality.
What is a data bus?
A system that transfers data within a computer.
What is spaghetti code?
Source code that is difficult to understand because it has no defined structure.