RFI Flashcards

1
Q

VMM aka…

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which plane is centralized on a SDN?

A

Control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OOP: Coupling

A

Level of dependence on other objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OOP: Cohesion

A

Level of independence of other objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OOP: high coupling, low cohesion

A

Object is dependent on other objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Federated identity model

A

Provide access to resources to third party organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Code freeze

A

Application passed testing and no more changes are made.

Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An active-active cluster acts like

A

A load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Do switches forward broadcast and multicast frames?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI Layer for circuit level proxy firewall

A

Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stateful firewall OSI layer

A

Layers 3 and 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compartmentalization

A

A subset of a group of people “need to know”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What math concept do Diffie-Hellman and ElGamal use?

A

Discrete Logarithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Object oriented databases vs. relational databases

A

OO used data and functions.
Relational uses relationships (primary/foreign key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of keys do TPM use?

A

Endorsement key
Storage root key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One time password is hard or easy to manage?

A

Hard

17
Q

What mitigates object reuse in programming?

A

Garbage collection

18
Q

What authentication type is transient?

A

Something you have

19
Q

Type 1, Type 2, and Type 3 authentication

A

Something you know, something you have, something you are

20
Q

What box color is static testing?

A

White Box

21
Q

Combinatorial testing

A

Test every possible variation

22
Q

Pairwise testing

A

Test more than one component at a time

23
Q

HDD slack space

A

unused space in a cluster

24
Q

Risk density

A

Ranks defects to quantify risk

25
Q

Defect density

A

Average number of defects per lines of code

26
Q

Weakest encryption mode

A

ECB

27
Q

Type of attack that uses identical source and destination IP’s

A

Land

28
Q

x.509

A

PKI standards

29
Q

x.500

A

Directory services standard

30
Q

Passive vs. Active Monitoring

A

Passive monitors live data
Active monitors synthetic data

31
Q

Pseudoflaw

A

False vulnerability in a honeypot

32
Q

What analysis type is used for hard drive forenscs?

A

Media Analysis

33
Q

Reference profile/reference template

A

Biometric registration