2.3 Application Development, Deployment, Automation Concepts Flashcards

1
Q

The practice of developing apps in an isolated testing environment with no internet or external connections.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two steps are critical to perform before having a new application go live?

A

Quality assurance

staging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are created in order to define the security of a newly developed application. Involves proper security settings, patches, and updating. Integrity measurements should check for this configuration.

A

Secure Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of deploying an application and configuring all security parameters.

A

Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ability for an appolication to handle varying workloads and adjust the necessary system resources accordingly.

A

Scalability and elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of managing the automation and overall managment of cloud application instances and security policies.

A

Orchestration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Process of dismantaling and removing application instances, taking particular care to ensure the security of the process.

A

Deprovisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These procedures in a SQL database restrict the user to what kinds of queries and commands they can perform in order to limit the possiblity of harmful queries taking place.

A

Stored procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of obscuring code in order to make it unreadable to an attacker.

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why does code reuse pose security concerns?

A

If the original code has vulnerabilities they are copied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Code that is used, results are tallied, but then not used anywhere else in the app yet not taken care of properly.

A

Dead code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of verifying all input into a program to protect against app input attacks.

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack can poor memory management lead to?

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Must be taken into consideration when your app is handling lots of sensitive data like PII and credit card info.

A

Data exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of making, documenting, and implementing changes to an application which can help with security analysis. Allows you to revert software to a previous version in the event a new change does not go as planned.

A

Version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The practice of using alternative compiler paths for an application in order to change the binary of each application. Attacks on a particular binary stop with that binary and they cannot attack other versions on different binaries.

A

Software diversity

17
Q

The process of code being constantly written and merged into an apps central repository, often mulitple times a day. Security becomes a major concern.

A

Continuous integration

18
Q
A