study 5 Flashcards

(37 cards)

1
Q

“ACID” property in DBMS stands for?

A
  1. Atomicity
  2. Consistency
  3. Isolation
  4. Durability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Atomicity

A

requires that each transaction is “all or nothing”:

if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Consistency

A

ensures that any transaction will bring the database from one valid state to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Isolation

A

ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other.

isolation is the main goal of concurrency control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Durability

A

means that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Final Acceptance Testing two major parts:

A
  1. Quality Assurance Testing QAT)
    focusing on the technical aspect of the application
  2. User acceptance testing: UAT)
    focusing on functional aspect of the application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The testing of an individual program or module.

It uses set of test cases that focus on control structure of procedural design.

A

Unit Testing

These tests ensures internal operation of the programs according to the specification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A series of tests designed to ensure that modified programs, objects, database schema, etc , which collectively constitute a new or modified system, function properly.

A

System Testing

These test procedures are often performed in a non-production test/development environment by software developers designated as a test team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hardware or software test that evaluates the connection of two or more components that pass information from one area to another.

A

Interface or integration testing:

The objective it to take unit tested module and build an integrated structure dictated by design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a Protocol that supports the creation of secure virtual private dial-up networks over the Internet.

A

L2F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

three part of ipsec

A
  1. AH
  2. ESP
  3. IKE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what part of IPSEC not work NAT

A

(AH) Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the two sub protocols of IKE

A
  1. Oakley = use Diffie Hellman for keys agreement

2. ISAKMP = manage the keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SA is setup by what sub protocols of IKE

A

ISAKMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RPC is at what level of the ISO model?

A

5 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Errors in critical modules are detected earlier in what software testing?

A

The bottom-up approach

17
Q

message digest is another word for

18
Q

A Pseudo flaw is?

A

An apparent loophole deliberately implanted in an operating system program as a trap for intruders.

19
Q

An identity-based access control is a type of ? Access Control that is based on an individual’s identity.

A

Discretionary Access Control (DAC)

20
Q

Physically securing backup tapes from unauthorized access is obviously a security concern and is considered a function of the:

A

Security Operations Domain.

21
Q

In IPSec, if the communication is to be gateway-to-gateway or host-to-gateway

22
Q

FCOE is a protocol that rides over Ethernet like iSCSI but is not itself routable

A

FCOE - Fiber Channel over Ethernet

23
Q

computer forensics:

To prevent sought-after information from being altered

A

Data Protection

24
Q

computer forensics:

All information and data required should transferred into a controlled location;

A

Data Acquisition
Each device must be checked to ensure that it is write protected. This may be achieved by using a device known as write blocker.

25
computer forensics: is a process that allows one to obtain bit-for bit copy of a data to avoid damage of original data or information when multiple analyses may be performed.
Imaging
26
computer forensics: | This process consist of identification and selection of data from the imaged data set.
Extraction
27
computer forensics: is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.
Interrogation
28
computer forensics: This process converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.
Investigation/ Normalization
29
Which type of lock uses a numeric keypad or dial to gain entry?
Cipher lock
30
What are the criteria which are often called the five rules of evidence:
``` 1. authentic ,2.accurate 3. complete 4. convincing 5. Admissible. ```
31
Intellectual property is divided into two categories:
Industrial and Copyright
32
A Public Key Infrastructure (PKI) provides what? (5)
1. confidentiality, 2. access control, 3. integrity, 4. authentication 5. non-repudiation.
33
the 3 steps required for a Kerberos session?
1. Principal P1 authenticates to the Key Distribution Center (KDC), 2. principal P1 receives a Ticket Granting Ticket (TGT), 3. and principal P1 requests a service ticket from the Ticket Granting Service (TGS) in order to access the application server P2.
34
? is the variation in the time of arrival at the receiver of the information.
Jitter
35
is the delay between the sender and the receiver decoding it
Latency
36
The 3 part of a relational model?
1. Structural: The model structure is described in terms of relations , tuples , attributes and domains . 2. Manipulative: Defines how the data in the model will be accessed and manipulated. 3. Constraints: The constraints determine valid ranges and values of data to be included in the model.
37
In the Bell-LaPadula model, the Star-property is also called:
The confinement property