Lecture 6 Flashcards
Data and Application Security (35 cards)
______ allows a single user to harness the computing power of one or more remote systems to achieve a single goal.
A. distributed computing
B. centralized computing
C. administered computing
A. distributed computing
This threat attached itself to a legitimate OS, file or application and performs unwanted actions. It spreads through infected media.
A. Trojan
B. Worm
C. Virus
C. Virus
What is a Trojan Horse threat?
Malicious code that is disguised as a harmless program.
A ____ is a threat that is dormat until a specific trigger
logic bomb
This type of threat is self-propagating.
A. Trojan
B. Worm
C. Virus
B. Worm
______ code objects sent from a server to a client to perform some action. They are self-contained and operate independently of the server.
Applets
_____ is intelligent code objects performing actions on behalf of a user.
A. applet
B. agent
C. COM
B. agent
The object management group (OMG) created ______. In this model a broker invokes the object to keep details transparent to the client
Common Object Request Broker Architecture (CORBA)
Microsoft created ____ which allows users to embed components from one app into another
Component Object Model (COM)
List the 4 characteristics of a relational database.
atomicity
consistency
isolation
durability
____ is where all or none of the instructions in a transaction are executed.
A. atomicity
B. consistency
C. isolation
D. durability
A. atomicity
_____ is where all transactions must follow the database rules.
A. atomicity
B. consistency
C. isolation
D. durability
B. consistency
_____ means that all transactions must operate independently.
A. atomicity
B. consistency
C. isolation
D. durability
C. isolation
_____ ensures that transactions committed to the database are preserved.
A. atomicity
B. consistency
C. isolation
D. durability
D. durability
In database a ____ is a SQL statement used to present data to a user as if it were a table. It can be used as a security tool.
View
A ______ is an interface for applications to communicate with different databases.
Open Database Connectivity (ODBC)
The collection of numerous non-sensitive items combined to derive more sensitive information.
A. Combination
B. Sniffing
C. Aggregation
D. Inference
C. Aggregation
Combining several pieces of information to gain access to information that should be classified at a higher level.
A. Combination
B. Sniffing
C. Aggregation
D. Inference
A. Combination
B. Sniffing
C. Aggregation
D. Inference
What is a data warehouse?
storage of large amounts of information from a variety of databases for use with specialized analysis techniques
A ____ channel is the transmission of sensitive data that shouldn’t exist/not documented.
covert
____ procedures ensure that security controls are properly implemented throughout the lifecycle of the system.
Assurance
What is a limit check?
It limits the type, format, length, or range of input information.
The ____ SDLC model is a series of iterative steps. Each phase is completed before the next begins.
A. Spiral
B. Waterfall
C. IDEAL
D. Agile
B. Waterfall
The ____ SDLC model allows for multiple iterations of an iterative style process.
A. Spiral
B. Waterfall
C. IDEAL
D. Agile
A. Spiral