vocabularyQ2R Flashcards

1
Q

Qualitative Risk Assessment

A

A technique that involves no numbers, only comparisons. This assessment type is used in ranking risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Quantitative Risk Assessment

A

A structured technique that assigns a numerical value to the likelihood and the extent of a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quantitative Risk Assessment

A

A structured technique which assigns a numerical value to the likelihood and the extent of a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Query Language

A

A language with primitive statements that extract data. A query language is required by every database and database product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RADIUS

A

Remote Authentication Dial-In User Server is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RADIUS

A

The Remote Authentication Dial-In User Service protocol is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAM

A

Random access memory is a type of real memory. It includes dynamic RAM which is slower, cheaper, and must be periodically charged because it uses capacitors. It also includes static RAM which uses flip-flop circuits that do not lose their charges, which is faster and more expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Random Access

A

The act of accessing memory in any order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reciprocal Processing Agreement

A

An agreement with a similar company that allows a disaster-stricken business to transfer data to the other business, thereby using their capacity until they recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reference Monitor

A

A control layer of software within the system that stands between subjects and objects to enforce access rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Register

A

An area of extremely fast memory within the CPU that is easy for the CU and ALU to read from and write to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Relational Database

A

A database architecture model which dictates that all data is stored logically as a collection of tables, each containing fields, and stored independently of each other. In a true relational database, no true relationships are stored in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Replay Attack

A

A type of attack in which the attacker intercepts the session and records it in order to play back the session at a later time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ring Topology

A

A LAN topology in which each node is connected to its neighbor on either side and messages travel from node to node until they reach their destination. This type of topology requires each machine to either have two NIC cards or special hardware allowing the NIC to connect on two sides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RISC

A

Reduced Instruction Set Computing is an instruction set design where there are few and smaller types of instructions that do one particular thing giving the compilers the option to combine small steps to get them to accomplish a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk

A

The combination of threat and vulnerability at any given time.

17
Q

Risk Assessment

A

The process of identifying and categorizing risks that threaten each businesss priorities and processes.

18
Q

ROM

A

Read-only memory is a type of real memory that is put on a chip at the manufacturing location. It is true read-only memory, so it can never be changed. Lowest-level instructions are put on ROM.

19
Q

Rootkit

A

Freely available software that exploits known vulnerabilities and increases system access.

20
Q

ROT3 Cipher

A

A type of cryptography in which each character is taken and three is added to that character to create a new character value, such as an A becoming a D.

21
Q

Router

A

A network layer device that determines the most favorable path on which to forward network traffic.

22
Q

Row

A

A group of fields positioned horizontally on a table. Also may be referred to as a record.

23
Q

RSA Encryption

A

Rivest-Shamir-Adelman encryption is a patented public key encryption standard. It was created by Ronald Rivest, Adi Shamir, and Leonard Adelman in 1978.