Host, Data, and Application Security Flashcards

1
Q

advanced persistent threats (APTs)

A

Any sophisticated series of related attacks taking place over an extended period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

APTs

A

advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Agile development

A

A method of software development where milestones and product release are more incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

baselining

A

creating a baseline security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Big Data

A

Data that is larger than what can be handled with traditional tools and algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

database normalization

A

The process of removing duplication in a relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

embedded system

A

Operating system in a device, sometimes on a single chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

fuzzing

A

A method of testing that intentionally enters invalid input to see if the application can handle it and look for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hardening

A

The process of making a server or an application resistant to an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Infrastructure as Code (IaC)

A

The process of managing and provisioning computer data centers through machine-readable definition files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IaC

A

Infrastructure as Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet of Things (IoT)

A

Devices that interact on the Internet, without human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NoSQL database

A

Datastores that do not use a relational structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Open Web Application Security Project (OWASP)

A

An online community that develops free articles, tools, etc on web application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OWASP

A

Open Web Application Security Project

17
Q

prototyping

A

Creating a version of an application that has only the bare minimum functionality so it can be evaluated before further development

18
Q

sandboxing

A

Operating in an isolated environment

19
Q

script kiddy

A

An attack with minimal technical knowledge; utilizes purchased, premade software

20
Q

secure coding

A

Programming in a manner that is secure

21
Q

stored procedures

A

SQL statements written and stored on the database that can be called by applications

22
Q

stress testing

A

Subjecting a system to workloads that are extreme

23
Q

Structured Query Language (SQL)

A

The language used by all relational databases

24
Q

SQL

A

Structured Query Language

25
Q

waterfall method

A

A software development method that uses very well-defined sequential phases; one big deliverable at the end of a long timeframe

26
Q

zero-day exploit

A

A vulnerability that is unknown to the product vendor, and thus there is no patch for it