Chapter 11 Flashcards

(51 cards)

1
Q

CSRF

A

Cross Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DevOps

A

Development and Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OWASP

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SDK

A

Software Development Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SDL

A

Software Development Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQL

A

Structured Query Langauge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QA

A

Quality Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

XSRF

A

Cross site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XSS

A

Cross site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4 environments Development, Test, Staging Production

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compiler

A

Compilers take computer programs written in one language and convert them to a set of codes that can run on a specific set of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Automation as it applies to DevOps

A

Automating routines and extensive processes allows fewer resources to cover more of the environment in a more effective and efficient manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code Reuse

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Continuous Delivery

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Continuous Deployment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Continuous Integration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Continuous monitoring

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Continuous validation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Exposure

A

Loss of control of data from a system during operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dead Code

A

Code that may be executed but is never actually used in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dead Code Elimination

A

Compilers that can take care of and remove dead code

22
Q

Deprovisioning

A

The removal of permissions or authorities.

23
Q

Elasticity

A

The characteristic that something is capable of change without breaking.

25
Garbage Collection
26
Legacy Code
27
Memory leaks
28
Normalization
29
Patch Management
30
Provisioning
31
Scalability
the characteristic of a software system to process higher workloads on its current resources (scale up) or on additional resources (scale out) without interruption.
32
Scripting
33
Software Integrity
34
Third Party Libraries
35
Versioning
36
What environment does the test environment mimic?
Production
37
What are two advantages of using SDK's and third party libraries?
38
What is an advantage of a stored procedure?
39
What is a disadvantage of a stored procedure?
40
What is DevOps?
41
Can encoded transmissions be used to bypass security mechanisms?
42
Maintaining control of codebase integrity means what two things are happening?
43
What is obfuscated/camoflaged code?
44
What do 0 and 1 mean in binary code?
45
Does all code possess weaknesses and vulnerabilities?
46
Why is the client not a suitable place to perform any critical value checks or security checks?
47
In terms of software scalability, what is the difference between scaling up and scaling out?
48
What is the monoculture avoidance as it applies to software diversity?
49
What are some programming languages used today?
50
What is legacy code? Should it be used in modern software development?
51
How is hashing used with codebase?