Misc Architecture and Design Flashcards

1
Q

Kevin knows that regression testing is necessary but wants to prevent old versions of code from being re-inserted into new releases. What process should he use to solve this problem?

A

Version numbering - Kevin should implement a version numbering scheme and make sure that the proper current version of software components is included in new releases and deployments. Developers can still manually reintroduce old code, but version numbering helps to ensure that you have a current version in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Differential backup vs incremental backup

A

Differential backups backup all of the changes since the last full backup. An incremental backup backs up all changes since the last incremental backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RAID 5

A

RAID level 5 is disk striping with distributed parity. It can withstand the loss of any single disk. Disk striping with distributed parity, can handle only one disk failing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RAID 0

A

RAID 0 is disk striping; it does not provide any fault tolerance. If one drive fails, you lose your data. Disk striping, which cannot handle disk failure,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAID 1

A

RAID 1 is mirroring. It does protect against the loss of a single disk but not with distributed parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAID 3

A

RAID 3 is disk striping with dedicated parity. This means a dedicated drive containing all the parity bits. Byte-level striping with dedicated parity and cannot tolerate more than a single drive failing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Community cloud

A

A community cloud presents a compromise measure. Community clouds are semi-private. They aren’t accessible to the general public but only to a small community of specific entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Elliptic curve encryption

A

Allows the use of a shorter key for the same strength that an RSA key would require, reducing the computational overhead required to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the point where false acceptance rate and false rejection rate cross over in a biometric system?

A

CER. The crossover error rate (CER) is the point where the FAR (false acceptance rate) and the FRR (false rejection rate) cross over. CER provides a means of comparing biometric systems based on their efficiency, with a lower CER being more desirable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stored procedure

A

Stored procedures are widely used in many database management systems to contain SQL statements. The database administrator (DBA), or someone designated by the DBA, creates the various SQL statements that are needed in that business, and then programmers can simply call the stored procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protected Cable Distribution

A

Protected cable distribution uses such controls as electrical, electromagnetic, and even acoustic or air pressure sensors to ensure that cables and distribution infrastructure are not accessed, allowing sensitive information to be transmitted in unencrypted form. The U.S. government identifies three options: hardened carrier, alarmed carrier, and continuously viewed protected distribution systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bcrypt

A

A key-stretching algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fog (edge) computing

A

a term coined by Cisco to describe cloud computing at the edge of an enterprise network. The more common term for this is edge computing, but you may encounter both terms. Fog implementations handle significant amounts of computation, communication, and storage activities locally, while also connecting to cloud services to perform some of the work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transit gateways

A

transit hubs used to connect VPCs (virtual private clouds) to on-premises networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Homomorphic encryption

A

can perform computations on the ciphertext without access to the private key that the ciphertext was encrypted with. When the computations are completed, the results are the same as if those computations had been performed against the original plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

code reuse attack

A

In a code reuse attack, the attacker executes code that is meant for some other purposes. In many cases, this can be old code that is no longer even used (dead code), even if that code is in a third-party library

17
Q

RAID 6

A

RAID 6, disk striping with dual parity, uses a minimum of four disks with distributed parity bits. RAID 6 can handle up to two disks failing.

18
Q

NIC teaming

A

NIC teaming can provide greater throughput by sending traffic through multiple network interface cards (NICs) while also assuring that loss of a card will not cause an outage, thus providing fault tolerance

19
Q

thin clients

A

computers that do not run their applications and storage from their local drives and instead rely on a remote server