Chapter 10 Flashcards

1
Q

What is a systematic effort to identify relationships between mission critical apps, processes, and ops?

A

Critical Path Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the tendency for various technologies, solutions, utilities, and systems to evolve and merge over time.

A

Technology Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What addresses facility design, landscaping, entrance concepts, campus layouts, lighting, road placement, and traffic management.

A

CPTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some security suggestions from CPTED?

A

Keep plants under 2.5 feet tall

Locate the data center at the core of the bldg

Mount cameras in full view

Keep entrances open and clear

Keep the number of entrances to a minimum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What describes the idea of making an entrance point look like an entrance point without obvious signs?

A

Natural Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What describes the means to create an open and obstacle-free area outside the building for people and criminals to be easily observed?

A

Natural Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What describes the actions of making an area feel like a community cares for it and intruders are at higher risk of detection ?

A

Natural Territorial Reinforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where should server rooms be located ?

A

At the center of the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What reflects or alters the electromagnetic field generated by the reader device ?

A

Passive Proximity Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of a field powered proximity device ?

A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a mechanism by which a communication pathway is either constantly or periodically checked with a test signal ?

A

Heartbeat Sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What describes the evaluation of the way someone walks as a form of biometric authentication/identification.

A

Gait Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some ways to prepare for equipment failures ?

A

Purchasing replacement parts

Storing equipment

Establishing an SLA with the Vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What describes the expected typical functional lifetime of the device?

A

MTTF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What describes the average length of time required to perform a repair on a device ?

A

MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What describes the estimation of time between the first failure and any subsequent failures after that.

A

MTBF

17
Q

What evaluates whether every if statement has been executed under all if and else conditions

A

Branch Coverage

18
Q

What tests whether every logical test in the code has been executed under all sets of input.

A

Condition Coverage

19
Q

What verifies that every function in the code has been called and returned results.

A

Function Coverage

20
Q

What verifies that every loop in the code has been executed under conditions that cause code execution multiple times, only once, and not at all.

A

Loop Coverage

21
Q

What offers high throughput with the least interference.

A

OFDM

22
Q

What is used to register a host’s dynamic multicast group membership in order to receive a copy of the data stream.

A

IGMP

23
Q

What occurs with a continuous signal that varies in frequency, amplitude, phase, voltage, and so on.

A

Analogue Communications

24
Q

What systems can be used to host or cache multicast datasets that are to be sent to the multiple recipients.

A

TFTP

25
Q

What is a nonprofit security project focusing on improving security for online or web-based applications, mobile device applications, and IoT equipment.

A

OWASP

26
Q

What is a programming and management technique used to reduce redundancy, often related to database management.

A

Normalization

27
Q

What are an allow lists of existing software functions where users or other applications are limited to the pre-determined range of functions.

A

Stored Procedures

28
Q

What is an application that can serve as a basic firewall by restricting access based on user IDs or system IDs.

A

TCP Wrapper

29
Q

What is a mechanism to tunnel TCP/IP through non-IP networks.

A

L2TP

30
Q

What database feature uses a “lock” feature to allow an authorized user to make changes and then “unlock” the data elements only after the changes are complete.

A

Concurrency

31
Q

What refers to the number of rows in the table?

A

Cardinality

32
Q

What adds a degree of fault tolerance, protecting against the impact of a single server failure.

A

Clustering

33
Q

What refers to creating the account and capturing biometric data.

A

Registration

34
Q

What an authorization framework described in Request for Comments (RFC) 6749.

A

OAuth 2.0

35
Q

What are converged protocols, which provide for a SAN and voice communication services.

A

VoIP
ISCSI
FCoE

36
Q

What is needed to provide and support certificates for DNSSEC?

A

PKI

37
Q

What are the six risk management frameworks ?

A

RMF
OCTAVE
COSO
ISACA
FAIR
TARA