study 5 Flashcards
(37 cards)
“ACID” property in DBMS stands for?
- Atomicity
- Consistency
- Isolation
- Durability
Atomicity
requires that each transaction is “all or nothing”:
if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged.
Consistency
ensures that any transaction will bring the database from one valid state to another.
Isolation
ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other.
isolation is the main goal of concurrency control.
Durability
means that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors.
Final Acceptance Testing two major parts:
- Quality Assurance Testing QAT)
focusing on the technical aspect of the application - User acceptance testing: UAT)
focusing on functional aspect of the application.
The testing of an individual program or module.
It uses set of test cases that focus on control structure of procedural design.
Unit Testing
These tests ensures internal operation of the programs according to the specification.
A series of tests designed to ensure that modified programs, objects, database schema, etc , which collectively constitute a new or modified system, function properly.
System Testing
These test procedures are often performed in a non-production test/development environment by software developers designated as a test team
A hardware or software test that evaluates the connection of two or more components that pass information from one area to another.
Interface or integration testing:
The objective it to take unit tested module and build an integrated structure dictated by design
a Protocol that supports the creation of secure virtual private dial-up networks over the Internet.
L2F
three part of ipsec
- AH
- ESP
- IKE
what part of IPSEC not work NAT
(AH) Authentication Header
the two sub protocols of IKE
- Oakley = use Diffie Hellman for keys agreement
2. ISAKMP = manage the keys
SA is setup by what sub protocols of IKE
ISAKMP
RPC is at what level of the ISO model?
5 Session
Errors in critical modules are detected earlier in what software testing?
The bottom-up approach
message digest is another word for
hash
A Pseudo flaw is?
An apparent loophole deliberately implanted in an operating system program as a trap for intruders.
An identity-based access control is a type of ? Access Control that is based on an individual’s identity.
Discretionary Access Control (DAC)
Physically securing backup tapes from unauthorized access is obviously a security concern and is considered a function of the:
Security Operations Domain.
In IPSec, if the communication is to be gateway-to-gateway or host-to-gateway
Tunnel mode
FCOE is a protocol that rides over Ethernet like iSCSI but is not itself routable
FCOE - Fiber Channel over Ethernet
computer forensics:
To prevent sought-after information from being altered
Data Protection
computer forensics:
All information and data required should transferred into a controlled location;
Data Acquisition
Each device must be checked to ensure that it is write protected. This may be achieved by using a device known as write blocker.