Glossary- R Flashcards

1
Q

race condition

A

A type of attack where an attacker is attempting to exploit a small window of time that may exist between the time that a resource is requested and when it is available for use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

radio resource control (RRC)

A

A part of the UTMS WCDMA wireless telecommunica- tions protocol that is used to facilitate the allocation of connections between mobile devices and base stations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

random access memory (RAM)

A

A type of semiconductor memory usually used for a computer’s main storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

rapid application development (RAD)

A

A software development life cycle process characterized by small development teams, prototypes, design sessions with end users, and development tools that integrate data design, data flow, user interface, and proto- typing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

razor wire

A

Coiled wire with razor-like barbs that may be placed along the top of a fence or wall to prevent or deter passage by unauthorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

read-only memory (ROM)

A

An early form of permanent memory that cannot be modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

reciprocal site

A

A data center that is operated by another company. Two or more orga- nizations with similar processing needs will draw up a legal contract that obligates one or more of the organizations to temporarily house another party’s systems in the event of a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

records

A

Documents describing business events such as meeting minutes, contracts, financial transactions, decisions, purchase orders, logs, and reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

recovery control

A

A control that is used after an unwanted event to restore a system or process to its pre-event state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

recovery point objective (RPO)

A

The time during which recent data will be irretriev- ably lost in a disaster. RPO is usually measured in hours or days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

recovery procedure

A

Instructions that key personnel use to bootstrap services that support critical business functions identified in the business impact assessment (BIA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

recovery strategy

A

A high-level plan for the resumption of business operations after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

recovery time objective (RTO)

A

The period from the onset of an outage until the re- sumption of service. RTO is usually measured in hours or days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

reduced sign-on

A

The use of a centralized directory service (such as LDAP or Microsoft Active Directory) for authentication into systems and applications. Users will need to log in to each system and application, using one set of login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

redundant array of independent disks (RAID)

A

A family of technologies that is used to improve the reliability, performance, or size of disk-based storage systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

referential integrity

A

The characteristic of relational database management systems that requires the database management system maintain the parent-child relationships between records in different tables and prohibits activities such as deleting parent re- cords and transforming child records into orphans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

registration authority (RA)

A

An entity that works within or alongside a certificate au- thority (CA) to accept requests for new digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

regulatory requirements

A

Formal statements, derived from laws and regulations, that describe the required characteristics a system must support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

relational database management system (rDBMS)

A

A database management system that permits the design of a database consisting of one or more tables that can contain fields that refer to rows in other tables. This is currently the most popular type of data- base management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

release management

A

The IT function that controls the release of software programs, applications, and environments. See also IT service management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

remote access

A

A service that permits a user to establish a network connection from a remote location so that the user can access network resources remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

remote copy (RCP)

A

A TCP/IP application layer protocol that is an early file transfer protocol used to copy files or directories from system to system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

remote desktop protocol (RDP)

A

A proprietary protocol from Microsoft that is used to establish a graphic interface connection with another computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

remote destruct

A

The act of commanding a device, such as a laptop computer or mo- bile device, to destroy stored data. Remote destruct is sometimes used when a device is lost or stolen to prevent anyone from being able to read data stored on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

remote login (rlogin)

A

A TCP/IP application layer protocol used to establish a command-line session on a remote system. Like TELNET, rlogin does not encrypt au- thentication or session contents, and has been largely replaced by secure shell (SSH). See also TELNET, secure shell (SSH).

26
Q

remote procedure call (RPC)

A

A network protocol that permits an application to ex- ecute a subroutine or procedure on another computer.

27
Q

repeater

A

An Ethernet network device that receives and retransmits signals on the network.

28
Q

reperformance

A

An audit technique where an IS auditor repeats actual tasks performed by auditees in order to confirm they were performed properly.

29
Q

replication

A

An activity where data that is written to a storage system is also copied over a network to another storage system and written. The result is the presence of up- to-date data that exists on two or more storage systems, each of which could be located in a different geographic region.

30
Q

request for change (RFC)

A

See change request.

31
Q

request for proposal (RFP)

A

A formal process where an organization solicits solution proposals from one or more vendors. The process usually includes formal requirements and desired terms and conditions. It is used to formally evaluate vendor proposals in order to make a selection.

32
Q

requirements

A

Formal statements that describe required (and desired) characteristics of a system that is to be built or acquired.

33
Q

residual risk

A

The risk that remains after being reduced through other risk treatment options.

34
Q

response document

A

Required action of personnel after a disaster strikes. Includes business recovery plan, occupant emergency plan, emergency communication plan, contact lists, disaster recovery plan, continuity of operations plan (COOP), and secu- rity incident response plan (SIRP).

35
Q

responsibility

A

A stated expectation of activities and performance.

36
Q

return on investment (ROI)

A

The ratio of money gained or lost as compared to an

original investment.

37
Q

reverse address resolution protocol (RARP)

A

A TCP/IP link layer protocol that is used by a station that needs to know the IP address that has been assigned to it. RARP has been largely superseded by DHCP. See also Dynamic Host Configuration Protocol (DHCP).

38
Q

reverse engineering

A

The process of analyzing a system to see how it functions, usu- ally as a means for developing a similar system. Reverse engineering is usually not per- mitted when it is applied to commercial software programs.

39
Q

right to audit

A

A clause in a contract where one party has the right to conduct an audit of the other party’s operations.

40
Q

ring topology

A

A network topology where connections are made from one station to the next, in a complete loop.

41
Q

RISC (reduced instruction set computer)

A

A central processing unit design that uses a smaller instruction set, which leads to simpler microprocessor design. See also central processing unit.

42
Q

risk

A

Generally, the fact that undesired events can happen that may damage property or disrupt operations; specifically, an event scenario that can result in property damage or disruption.

43
Q

risk acceptance

A

The risk treatment option where management chooses to accept the risk as-is.

44
Q

risk analysis

A

The process of identifying and studying risks in an organization.

45
Q

risk assessment

A

A process where risks, in the form of threats and vulnerabilities, are
identified for each asset.

46
Q

risk avoidance

A

The risk treatment option involving a cessation of the activity that introduces identified risk.

47
Q

Risk IT Framework

A

A risk management model that approaches risk from the enter- prise perspective.

48
Q

risk management

A

The management activities used to identify, analyze, and treat risks.

49
Q

risk mitigation

A

The risk treatment option involving implementation of a solution
that will reduce an identified risk.

50
Q

risk transfer

A

The risk treatment option involving the act of transferring risk to an- other party, such as an insurance company.

51
Q

risk treatment

A

The decision to manage an identified risk. The available choices are mitigate the risk, avoid the risk, transfer the risk, or accept the risk.

52
Q

role

A

A set of privileges in an application. Also a formally defined set of work tasks as- signed to an individual.

53
Q

rollback

A

A step in the software development life cycle where system changes need to be reversed, returning the system to its previous state.

54
Q

rootkit

A

A type of malware that is designed to evade detection.

55
Q

router

A

A device that is used to interconnect two or more networks.

56
Q

routing information protocol (RIP)

A

A TCP/IP routing protocol that is used to transmit network routing information from one network router to another in order to determine the most efficient path through a network. RIP is one of the earliest routing protocols and is not used for Internet routing.

57
Q

row

A

A unit of storage in a relational database management system (rDBMS) that con- sists of a single record in a table. See also relational database management system, table.

58
Q

RPC gateway

A

A system that facilitates communication through the RPC suite of pro- tocols between components in an application environment.

59
Q

RS-232

A

A standard protocol for sending serial data between computers.

60
Q

RS-449

A

A standard protocol for sending serial data between network devices.