Exam 3

Ace your homework & exams now with Quizwiz!

Attribute

A column in a relational database table

Durability

A completed transaction is permanent

Buffer Overflow

A video streaming applet written in Java and downloaded to clients from a server presents the greatest threat of which type of attack?

Atomicity

All changes take effect or none do

Composed of 32 bits

An IP address is...

Buffer Overflow

An example would passing a string into an input filed on a web page that is too long for the field

Primary keys must be numeric

For Relational Database Systems, which of the following is NOT true?

Partitioning

From lecture, which is NOT a concept associated with object-oriented application development?

Operating System Layer

Generally, the first layer of application security for which the security professional is concerned is:

It should be live real-time online data from the current production system.

In testing phase of an application development project, which is not a desirable characteristic of test data that will be used to evaluate a newly developed application?

Perform Unit test to evaluate the security of code

In the Project initiation phase of the system development life cycle, which is not an important consideration for a security professional?

IM communications generally lack encryption

Many corporate telecommunication environments now support IM. Which is TRUE of IM communications is:

OSI

Model used to describe telecommunications data transfer

Check Sum Redistribution

Regarding application security, which is not a common issue that poses a potential threat?

24

The IP value of 00011000

the DNS

To resolve IP numbers to names and names to IP numbers is the function of...

Online Transaction Processing

Transactions are recorded in real-time

No entry to either system will be made and both users will be foreced to re-entery their respective transactions

Two of XYZ Co. sales reps at different customer locations both attempt to enter a sales transaction for the same product in XYZ's inventory system at the exact same time. If XYZ Co uses a relational database for sales and inventory management, what is the likely outcome of this transaction?

Worm

Typically attacks server software

DNS

Used to tanslate IP addresses to host names

Virus

User action is required spread this

Buffer Overflow

When application developers fail to provide appropriate means in application source code to truncate or limit input string size into interface fields, the application becomes susceptible to which type of attack?

IPS is a preventive control

Which is TRUE of an IPS?

SQL Injection

Which of the follow is a common database threat?

Reduces liability for data breach

Which of the following is NOT an advantage of using a database management system?

IDS are detective controls

Which of the following is TRUE of IDS?

End User

Which of the following is generally not considered part of a data network?

The Network Connection

Which of the following is not a concern regarding database security?

OSI is the model upon which the TCP/IP protocol is based

Which of the following statements about OSI and TCI/IP is correct?

Publish a clear policy on remote access

Which should be the first step in establishing organization control for remote access?


Related study sets

7 Habits of highly effective people

View Set

Microeconomics Midterm Study Guide

View Set

Ch 29 Management of Pts w Complications from Heart Disease

View Set

Ch 2 - Consolidation of Financial Information

View Set

Micro Econ Final Exam (Missed Questions)

View Set