Cybersecurity ch 4
What is the highest level of normalization that you can achieve with a database?
6NF - Sixth Normal Form
You have been assigned to decide the process used for software application development at your company. Since the products need to be developed and deployed as each module is completed, you chose to go with agile application development. Your manager has requested you consider SecDevOps. Which of the following is a significant and key feature of using SecDevOps that can be considered for selecting this project's development model?
Automation
You have a version control system installed. Several developers work with this system. A new developer wants to work on the code. What is the first task that the developer must perform?
Check out the existing code
A company has its network compromised. As an expert professional, the organization has hired you to identify the probable cause of the attack and fix it. As a security professional, you have noticed the pattern of compromise is unlike anything previously seen. You are looking to find new information on vulnerabilities like the attack that occurred. Which of the following actions would help achieve this objective?
Checking the dark web
In which type of software environment are you most likely to find Microsoft Visual Studio and Eclipse?
Development
Why was the BIOS framework relocated to flash memory from a complementary metal-oxide-semiconductor (CMOS) in later development?
Flash memory provides stability to the BIOS framework and makes update installation much easier than with CMOS.
Makayla has created software for automating the accounting process at ABL Manufacturing. She completed the software development, with testing done during development at individual stages. Before putting the software into production, Mary, who is in charge of the testing software, ran the application using tools and generated a report giving the various inputs and corresponding exceptions generated by the application. What process did Mary use?
Fuzzing
Which of the following is a disadvantage of the secure boot process?
It makes third party non-vendor-approved software difficult to implement.
What is the secure coding technique that organizes data within the database for minimum redundancy?
Normalization
Sheena wants to make sure that her browser activity is safe and prevent others from intercepting her data as it is transmitted over the browser. What should Sheena do to achieve this objective?
Only visit websites that are hosted over HTTPS or HSTS
Which of the following uses vulnerable applications to modify Microsoft registry keys?
System tampering
Which of the following loop runs until a statement becomes true?
Until loop
What is the inbuild application available to prevent threat actors from modifying the registry in a Windows 10 operating system?
Windows 10 tamper protection
A cybercriminal attempts to trick a computer's user into sharing their personal information by implementing content to discreetly capture user information over the actual webpage. What should the user implement to avoid this situation?
X-Frame
Which of the following statements is true for the scalability of a system?
You can add more resources to the system to gain optimal application performance