3 Flashcards

(50 cards)

1
Q

What are the four processes of an access control system?

A

identification
authentication
authorization
accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What principle ensures that users do not receive rights unless granted explicitly?

A

implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which non- discretionary access control type is based on the idea of security clearance levels? MAC, RBAC, DAC, or rule-based?

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does MAC stand for?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What sort of account allows someone to access a computer without providing a user name or password?

A

guest account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a one-time password work?

A

A unique password is generated using an algorithm known to both a device (fob) and the user authenticating server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of cryptographic operation(s) are intended to be non-reversable?

A

hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does AAA stand for and in which order are they typically performed?

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If the .mp3 extension is for music what extension is for video?

A

.mp4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The program used to manage storage, network, and virtual machines interacts directly with the hardware. This program can be considered as an instance of ____________.

A

A Type 1 hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an n-tier application design

A

A software architectural pattern that divides an application into multiple layers or “tiers,” each responsible for a specific set of functionalities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name three benefits that can be expected from implementing an n-tiered application design strategy?

A

improved performance
increased scalability
enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the framework consisting of six steps that software developers use to develop and sustain software solutions?

A

SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does SDLC stand for?

A

Software Development Life Cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In order what are the six steps of SDLC (Software Development Life Cycle)?

A
  1. requirements gathering and analysis
  2. design
  3. implementation
  4. testing
  5. deployment
  6. maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does CLI stand for?

A

command line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What issue does the installation of cross-platform software aim to solve?

A

compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the CORRECT description of an application operating on a standard operating system?

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In computer programming what is a variable?

A

A data storage location that can hold a value that may change throughout the program’s execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two key roles of an OS?

A
  1. Provide structure for file and data management.
  2. Provide protection against malware and viruses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name two markup languages.

22
Q

What is “scripting language”?

A

A programming language that closely resembles machine code, a binary code that the computer processor uses to execute instructions.

23
Q

In software development, what is a function?

A

A block of code designed to perform a specific task and can be used to divide a program into reusable components.

24
Q

What type of programming language is typically the QUICKEST for writing ad hoc programs?

A

scripting language

25
What is scripting language?
They are designed to be easy to write and executed, making them well-suited for quick and informal programming tasks.
26
What is the correct way to reference the Name property of the third element in an array called Cities? Cities 2.Name Cities 4].Name Cities [2].Name Cities 3.Name Explain why.
Cities [2].Name Arrays are zero indexed. I don't know why the 2 is in brackets.
27
Which one of these is a programming language that is compiled? PowerShell Peri Java JScript
Java
28
WHAT IS A BRANCHING STATEMENT?
A BRANCHING STATEMENT IS USED TO CHOOSE DIFFERENT PATHS OF EXECUTION BASED ON A CONDITION.
29
Give five examples of a "branching" statement.
if else else if switch case
30
What is an attribute in computer programming?
A characteristic of piece of data that describes an object.
31
What's the difference between a compiled and an interpreted programming language?
Interpreted is ran line by line. Compiled is ran all at once.
32
Name the six most popular "interpreted" programming languages.
1. Python 2. JavaScript 3. PHP 4. Rudy 5. Perl 6. Bash/Shell
33
Name the six most popular "compiled" programming languages.
1. C 2. C++ 3. Java 4. Go (Golang) 5. Rush 6. Swift
34
In programming what is an "algorithm" ?
A step-by-step set of instructions that can be used by a computer program to solve a specific problem.
35
What programming language resembles machine language the most?
Assembly languages.
36
In computer programming, what is a function? Two things.
1. encapsulated code that performs a specific task 2. the block of code can be executed multiple times within a program
37
In computer programming, what is a suitable way to store a series of strings among the following options? branch array constant variable
array
38
What is the best description of the purpose of a vector in programming?
Performing mathematical calculations
39
Which of the following actions was taken when an administrator provided authorization for a user to access data within a database? data correlation data definition data manipulation data gathering Why is the answer data definition?
Because the administrator is determining the connection between the user and the data in the database, and establishing the ways in which the user can interact with the data. Essentially defining the way in which the user can interact with the data.
40
What did the database administrator create by outlining the components and functionality of a database?
schema
41
What refers to the ability of data to remain stored even after the application that created it has been closed.
data persistence
42
What database concept is most probable to employ a CSV file?
data importing
43
Most suitable term to describe the creation of a data storage specification for a table?
schema
44
Name two things that a schema does.
1. it defines structure of a database 2. it serves as documentation for the database
45
What is the term used to evaluate the disk performance of a database?
latency
46
What is a characteristic that can be used to distinguish a specific record in a database from all other records?
primary key
47
In database queries, what is a characteristic of an entity, such as a person, place, or thing, that is stored in a table?
attribute
48
What do you call the rule placed of a database to limit the type of data that can be stored or ensure data integrity?
constraint
49
What do you call the reference in a database that points to the unique identifier in the parent table?
foreign key
50
This is a popular NoSQL database that used a document-oriented data model.
MongoSQL