Exam 3
Attribute
A column in a relational database table
Durability
A completed transaction is permanent
Buffer Overflow
A video streaming applet written in Java and downloaded to clients from a server presents the greatest threat of which type of attack?
Atomicity
All changes take effect or none do
Composed of 32 bits
An IP address is...
Buffer Overflow
An example would passing a string into an input filed on a web page that is too long for the field
Primary keys must be numeric
For Relational Database Systems, which of the following is NOT true?
Partitioning
From lecture, which is NOT a concept associated with object-oriented application development?
Operating System Layer
Generally, the first layer of application security for which the security professional is concerned is:
It should be live real-time online data from the current production system.
In testing phase of an application development project, which is not a desirable characteristic of test data that will be used to evaluate a newly developed application?
Perform Unit test to evaluate the security of code
In the Project initiation phase of the system development life cycle, which is not an important consideration for a security professional?
IM communications generally lack encryption
Many corporate telecommunication environments now support IM. Which is TRUE of IM communications is:
OSI
Model used to describe telecommunications data transfer
Check Sum Redistribution
Regarding application security, which is not a common issue that poses a potential threat?
24
The IP value of 00011000
the DNS
To resolve IP numbers to names and names to IP numbers is the function of...
Online Transaction Processing
Transactions are recorded in real-time
No entry to either system will be made and both users will be foreced to re-entery their respective transactions
Two of XYZ Co. sales reps at different customer locations both attempt to enter a sales transaction for the same product in XYZ's inventory system at the exact same time. If XYZ Co uses a relational database for sales and inventory management, what is the likely outcome of this transaction?
Worm
Typically attacks server software
DNS
Used to tanslate IP addresses to host names
Virus
User action is required spread this
Buffer Overflow
When application developers fail to provide appropriate means in application source code to truncate or limit input string size into interface fields, the application becomes susceptible to which type of attack?
IPS is a preventive control
Which is TRUE of an IPS?
SQL Injection
Which of the follow is a common database threat?
Reduces liability for data breach
Which of the following is NOT an advantage of using a database management system?
IDS are detective controls
Which of the following is TRUE of IDS?
End User
Which of the following is generally not considered part of a data network?
The Network Connection
Which of the following is not a concern regarding database security?
OSI is the model upon which the TCP/IP protocol is based
Which of the following statements about OSI and TCI/IP is correct?
Publish a clear policy on remote access
Which should be the first step in establishing organization control for remote access?