Sample Test Questions Domain 8 Flashcards

1
Q

___ is used when databases are clustered to provide high fault tolerance and performance

A

Online transaction processing (OLTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

in database design, the ACID test stands for:

A

Atomicity, Consistency, Isolation, Durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ in database design refers to dividing transactions into units of work ensuring that all modifications take effect or none take effect

A

Atomicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ in database design means that a transaction must follow the integrity policy developed for that particular database and ensure all data is consistent in the different databases

A

Consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ in database design means that transactions execute in isolation until completed, without interacting with other transactions. The results of the modification are not available until the transaction is completed

A

Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ in database design means that once the transaction is verified as accurate on all systems, it is committed, and the databases cannot be rolled back

A

Durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the ___ database model, records and fields are related in a logical tree structure. Parents can have one child, many children, or no children

A

hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an ___ database, when an application queries for data, it receives both the data and the procedure

A

object-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ testing involves testing an individual component in a controlled environment to validate data structure, logic, and boundary conditions

A

Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ development involves the use of independent and standardized modules

A

Component-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Java ___ converts the bytecode into machine-level code that the processor on the particular system can understand

A

Virtual Machine (JVM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ integrity guarantees that the tuples are uniquely identified by primary key values

A

Entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ___ is an XML-based protocol that was created to replace Remote Procedure Calls (RPCs) and allow applications running on different operating systems to exchange information over the Internet

A

Simple Object Access Protocol (SOAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP was not designed to work with ___, but SOAP was designed to work with HTTP

A

Remote Procedure Calls (RPCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is the best first step for developers to take to identify the security controls that should be coded into a software project

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___, or persistent XSS vulnerability, is targeted at websites that allow users to input data that is stored in a database or other location, such as a forum or message board. These types of platforms are among the most commonly plagued by XSS vulnerabilities.

A

second-order vulnerability

17
Q

nonpersistent XSS vulnerabilities, also referred to as ___, occur when an attacker tricks the victim into opening a URL programmed with a rogue script to steal the victim’s sensitive information (such as a cookie)

A

reflected vulnerabilities

18
Q

in ___ cross-site scripting (XSS) attacks, which are also referred to as local cross-site scripting, document components of websites such as form fields and cookies can be referenced through JavaScript and modified

A

document object model (DOM)–based

19
Q

___ is the most recent evolution in antimalware detection, it allows suspicious code to execute within the operating system and watches its interactions looking for suspicious activities

A

Behavior blocking

20
Q

In object-oriented programming objects need to be able to communicate with each other, and this happens by using ___ that are sent to the receiving object’s application program interface (API)

21
Q

in a covert storage channel, processes are able to ___ through some type of storage space on the system

A

communicate

22
Q

A ___ is used to recover data if there is a system failure or problem during a transaction

A

checkpoint

23
Q

___ is the international standard that provides guidance to organizations in integrating security to the processes used for managing their applications

A

ISO/IEC 27034

24
Q

The ___ is a nonprofit organization made up of an international group of experts, industry practitioners, and organizational representatives who produce open-source and widely agreed-upon best-practice security standards for the World Wide Web

A

Web Application Security Consortium (WASC)

25
___ provides a machine-readable description of the specific operations provided by a specific web service
Web Services Description Language (WSDL)
26
___ provides a method for web services to be registered by service providers and located by service consumers
Universal Description, Discovery and Integration (UDDI)
27
When changes take place to a software product during its development life cycle, a ___ system can be put into place that allows for change control processes to take place through automation.
software configuration management (SCM)
28
a ___ can help ensure that corporate change control policies and procedures are adhered to and should log all code accesses as a detective control as well. But foremost, it can help ensure that code is only ever accessed by an authorized developer
code versioning system (CVS)
29
the best way to ensure that newly acquired software is secure and functional is by ___
black-box testing it in a lab
30
a ___ can manifest as sporadic ICMP traffic both incoming and outgoing
rootkit
31
___ is a systematic approach to deliberately regulating the changing nature of projects.
change management
32
___ is the process of controlling the specific changes that take place during the life cycle of a system.
change control
33
The security posture of ___, ___, and ___ are the three overarching concerns for any software development environment
development platforms; code repositories; software configurations