Chapter 7 Host, Data, and Application Security Flashcards

1
Q

Relational Database

A

Allows data to be viewed in dynamic ways based on the user’s or administrator’s needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One-Tier Model

A

Database and application exist on a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two-Tier Model

A

The client workstation runs an application that communicates with the database that is running on a different server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three-Tier Model

A

Effectively isolates the end user from the database by introducing a middle-tier server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Middle-Tier Server

A

Accepts requests from clients, evaluates them, and sends them on to the database server for processing, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NoSQL Database

A
  • Not a relational database and doesn’t use SQL.

- Often used where scaling is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Storage Area Network (SAN)

A

A separate network set up to appear as a server to the main organizational network, basically just to store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fuzzing

A

Providing unexpected values as input to an application in order to make it crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Open Web Application Security Project (OWASP)

A

A voluntary group dedicated to forming secure coding practices for web-based applications and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Emergency Response Team (CERT)

A

Detail standards for secure coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hotfix

A

An immediate and urgent patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Patch

A

A non-urgent fix or functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Service Packs

A

Cumulative assortment of the hotfixes and patches to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Full Control

A

A user can read, write, execute, and assign permissions to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modify

A

Read and write with delete added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Read and Execute

A

Allows the user to run a program

17
Q

List Folder Contents

A

Allows the user to see what is in a folder but not to read the files

18
Q

Web Application Firewall (WAF)

A

Looks at every request between a web client and a web server and identifies possible attacks

19
Q

What should you always disable on an FTP server?

A

The anonymous account

20
Q

3 Main Attacks on DNS Servers

A

1) DoS
2) Footprinting
3) Compromising Record Integrity

21
Q

Footprinting

A

The act of gathering data about a network in order to find ways that someone might intrude.

22
Q

DNS Poisoning

A

A daemon caches DNS reply packets and uses the extra data to try to get useful info for other attacks

23
Q

Full Backup

A

All changes to the data are archived

24
Q

Differential Backup

A

All changes since the last full backup are archived

25
Incremental Backup
All changes since the last backup of any type are archived.
26
Hierarchical Storage Management (HSM)
Provides continuous online backup by using optical or tape jukeboxes
27
RAID 1 + 0 (10)
- A mirrored data set which is then striped | - Minimum of 4 drives
28
RAID 0 + 1
- The stripes are mirrored | - Minimum of 4 drives
29
Data at Rest
Data currently not being transmitted
30
Data in Transit
Information being sent
31
Data Loss Prevention (DLP) Systems
Monitor the contents of systems to make sure that key content is not deleted or removed.
32
Trusted Platform Module (TPM)
A chip that can store cryptographic keys, passwords, or certificates.
33
Hardware Security Module (HSM)
A cryptoprocessor that can be used to enhance security, commonly used with PKI systems