Chapter 7 Host, Data, and Application Security Flashcards

1
Q

Relational Database

A

Allows data to be viewed in dynamic ways based on the user’s or administrator’s needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One-Tier Model

A

Database and application exist on a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two-Tier Model

A

The client workstation runs an application that communicates with the database that is running on a different server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three-Tier Model

A

Effectively isolates the end user from the database by introducing a middle-tier server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Middle-Tier Server

A

Accepts requests from clients, evaluates them, and sends them on to the database server for processing, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NoSQL Database

A
  • Not a relational database and doesn’t use SQL.

- Often used where scaling is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Storage Area Network (SAN)

A

A separate network set up to appear as a server to the main organizational network, basically just to store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fuzzing

A

Providing unexpected values as input to an application in order to make it crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Open Web Application Security Project (OWASP)

A

A voluntary group dedicated to forming secure coding practices for web-based applications and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Emergency Response Team (CERT)

A

Detail standards for secure coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hotfix

A

An immediate and urgent patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Patch

A

A non-urgent fix or functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Service Packs

A

Cumulative assortment of the hotfixes and patches to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Full Control

A

A user can read, write, execute, and assign permissions to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modify

A

Read and write with delete added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Read and Execute

A

Allows the user to run a program

17
Q

List Folder Contents

A

Allows the user to see what is in a folder but not to read the files

18
Q

Web Application Firewall (WAF)

A

Looks at every request between a web client and a web server and identifies possible attacks

19
Q

What should you always disable on an FTP server?

A

The anonymous account

20
Q

3 Main Attacks on DNS Servers

A

1) DoS
2) Footprinting
3) Compromising Record Integrity

21
Q

Footprinting

A

The act of gathering data about a network in order to find ways that someone might intrude.

22
Q

DNS Poisoning

A

A daemon caches DNS reply packets and uses the extra data to try to get useful info for other attacks

23
Q

Full Backup

A

All changes to the data are archived

24
Q

Differential Backup

A

All changes since the last full backup are archived

25
Q

Incremental Backup

A

All changes since the last backup of any type are archived.

26
Q

Hierarchical Storage Management (HSM)

A

Provides continuous online backup by using optical or tape jukeboxes

27
Q

RAID 1 + 0 (10)

A
  • A mirrored data set which is then striped

- Minimum of 4 drives

28
Q

RAID 0 + 1

A
  • The stripes are mirrored

- Minimum of 4 drives

29
Q

Data at Rest

A

Data currently not being transmitted

30
Q

Data in Transit

A

Information being sent

31
Q

Data Loss Prevention (DLP) Systems

A

Monitor the contents of systems to make sure that key content is not deleted or removed.

32
Q

Trusted Platform Module (TPM)

A

A chip that can store cryptographic keys, passwords, or certificates.

33
Q

Hardware Security Module (HSM)

A

A cryptoprocessor that can be used to enhance security, commonly used with PKI systems