RFI Flashcards

1
Q

VMM aka…

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which plane is centralized on a SDN?

A

Control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OOP: Coupling

A

Level of dependence on other objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OOP: Cohesion

A

Level of independence of other objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OOP: high coupling, low cohesion

A

Object is dependent on other objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Federated identity model

A

Provide access to resources to third party organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Code freeze

A

Application passed testing and no more changes are made.

Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An active-active cluster acts like

A

A load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Do switches forward broadcast and multicast frames?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI Layer for circuit level proxy firewall

A

Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stateful firewall OSI layer

A

Layers 3 and 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compartmentalization

A

A subset of a group of people “need to know”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What math concept do Diffie-Hellman and ElGamal use?

A

Discrete Logarithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Object oriented databases vs. relational databases

A

OO used data and functions.
Relational uses relationships (primary/foreign key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of keys do TPM use?

A

Endorsement key
Storage root key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One time password is hard or easy to manage?

17
Q

What mitigates object reuse in programming?

A

Garbage collection

18
Q

What authentication type is transient?

A

Something you have

19
Q

Type 1, Type 2, and Type 3 authentication

A

Something you know, something you have, something you are

20
Q

What box color is static testing?

21
Q

Combinatorial testing

A

Test every possible variation

22
Q

Pairwise testing

A

Test more than one component at a time

23
Q

HDD slack space

A

unused space in a cluster

24
Q

Risk density

A

Ranks defects to quantify risk

25
Defect density
Average number of defects per lines of code
26
Weakest encryption mode
ECB
27
Type of attack that uses identical source and destination IP's
Land
28
x.509
PKI standards
29
x.500
Directory services standard
30
Passive vs. Active Monitoring
Passive monitors live data Active monitors synthetic data
31
Pseudoflaw
False vulnerability in a honeypot
32
What analysis type is used for hard drive forenscs?
Media Analysis
33
Reference profile/reference template
Biometric registration