Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
43 Cards in this Set
- Front
- Back
Seven phases of the system lifecycle.
|
Project initiation, functional design, system design and specification, software development, installation, maintenance, revision
|
|
Three common software development lifecycle models.
|
Waterfall, modified waterfall, spiral
|
|
Software development lifecycle model that allows for iteration back to the previous phase of development.
|
Waterfall
|
|
Software development lifecycle model that incorporates verification and validation into the waterfall model.
|
Modified waterfall
|
|
Software development lifecycle model that uses iterations of the entire process gradually refining the finished product.
|
Spiral
|
|
Five phases of the capability maturity model (CMM).
|
level 1 - initiating, level 2 - repeatable, level 3 - defined, level 4 - managed, level 5 - optimized
|
|
Five phases of the IDEAL model.
|
level 1 - initiating, level 2 - diagnosing, level 3 - establishing, level 4 - acting, level 5 - learning
|
|
Five generations of programming languages.
|
1st generation - machine language, 2nd generation - assembly language, 3rd generation - C, 4th generation - SQL, 5th generation - visual studio
|
|
Two types of high level languages.
|
Interpreted, compiled
|
|
Four components of an object oriented environment.
|
Attributes, methods, classes, instances
|
|
The number of rows in s table.
|
Cardinality
|
|
The number of columns in a table.
|
Degree
|
|
Any combination of attributes that uniquely identifies the rows in a table.
|
Candidate key
|
|
The candidate key selected by the database administrator to identify the rows of the table.
|
Primary key
|
|
Keys used to reference other tables in the same database.
|
Foreign key
|
|
Process used to ensure that the attributes in the table are dependent only on the primary key.
|
Normalization
|
|
Control that ensures that two processes don't modify the data at the same time.
|
Concurrency
|
|
Control that ensures that they foreign key values actually correspond to an entry in the referenced table.
|
Referential integrity
|
|
Control that ensures that groups of related statements either succeed or fail as a group.
|
Transaction
|
|
All transactions must meet four standard criteria.
|
Atomic, consistent, isolated, durable (ACID)
|
|
Three types of database attacks.
|
Aggregation, inference, SQL injection
|
|
Systems that attempt to use a series of rules to mimic the behavior of a human expert in decision making.
|
Expert systems
|
|
A common type of artificial intelligence system used to predict future events based on a large history of past events.
|
Neural network
|
|
Seven types of viruses.
|
File infector, companion, boot sector, multipartite, stealth, polymorphic, encrypting
|
|
Viruses that attach themselves to a file and spread when the file is executed.
|
File infector
|
|
Viruses that use file names similar to legitimate operating system file names but with different extensions to hide on the system and force execution.
|
Companion
|
|
Viruses that infect the part of the hard drive used by the operating system at boot time.
|
Boot sector
|
|
Viruses that combine attributes of file infector and boot sector viruses.
|
Multipartite
|
|
Viruses that use various techniques to hide their activity from antivirus software.
|
Stealth
|
|
Viruses that change from system to system in an attempt to avoid signature detection systems.
|
Polymorphic
|
|
Viruses that use cryptographic techniques to hide themselves from signature detection systems.
|
Encrypting
|
|
Similar to viruses and use many of the same infection vectors but spread from system to system without user intervention.
|
Worms
|
|
Malware that disguises itself as a legitimate program to trick the user into executing them but then perform malicious activity in the background,
|
Trojan horse
|
|
Malware that waits for a certain event to occur, then delivers its payload.
|
Logic bomb
|
|
Attacks that attempt to prevent the legitimate use of a system by disabling it in some way.
|
Denial of service
|
|
Attack that attempts to overflow the systems ability to handle the three way TCP handshake by initiating bit not completing a large number of handshakes.
|
SYN flood
|
|
Attack that uses overlapping fragments to confuse the TCP/IP stack of older OSs
|
Teardrop
|
|
Attack that leverages a large network of compromised systems to flood a target with requests.
|
Distributed denial of service
|
|
An attack which uses spoofed ICMP echo requests to trick a large number of remote systems into flooding a taegeted system with ICMP echo reply packets
|
Smurf
|
|
Attack that sends specially crafted packets with identical source and destination IP address/port pairs causing some operating systems to crash.
|
Land
|
|
Systems specifically designed to attract attackers in an attempt to study their activity and/or deflect them from attacking high value targets.
|
Honeypot
|
|
Networks of honeypots, commonly made up of varied operating systems and patch levels.
|
Honeynets
|
|
Monitored IP subnets that should have no legitimate activity and have no hosts authorized in the IP address range,
|
Darknet
|