vocabularyQ2R Flashcards
Qualitative Risk Assessment
A technique that involves no numbers, only comparisons. This assessment type is used in ranking risks.
Quantitative Risk Assessment
A structured technique that assigns a numerical value to the likelihood and the extent of a risk.
Quantitative Risk Assessment
A structured technique which assigns a numerical value to the likelihood and the extent of a risk.
Query Language
A language with primitive statements that extract data. A query language is required by every database and database product.
RADIUS
Remote Authentication Dial-In User Server is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.
RADIUS
The Remote Authentication Dial-In User Service protocol is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.
RAM
Random access memory is a type of real memory. It includes dynamic RAM which is slower, cheaper, and must be periodically charged because it uses capacitors. It also includes static RAM which uses flip-flop circuits that do not lose their charges, which is faster and more expensive.
Random Access
The act of accessing memory in any order.
Reciprocal Processing Agreement
An agreement with a similar company that allows a disaster-stricken business to transfer data to the other business, thereby using their capacity until they recover.
Reference Monitor
A control layer of software within the system that stands between subjects and objects to enforce access rules.
Register
An area of extremely fast memory within the CPU that is easy for the CU and ALU to read from and write to.
Relational Database
A database architecture model which dictates that all data is stored logically as a collection of tables, each containing fields, and stored independently of each other. In a true relational database, no true relationships are stored in the database.
Replay Attack
A type of attack in which the attacker intercepts the session and records it in order to play back the session at a later time.
Ring Topology
A LAN topology in which each node is connected to its neighbor on either side and messages travel from node to node until they reach their destination. This type of topology requires each machine to either have two NIC cards or special hardware allowing the NIC to connect on two sides.
RISC
Reduced Instruction Set Computing is an instruction set design where there are few and smaller types of instructions that do one particular thing giving the compilers the option to combine small steps to get them to accomplish a specific task.