• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
Seven phases of the system lifecycle.
Project initiation, functional design, system design and specification, software development, installation, maintenance, revision
Three common software development lifecycle models.
Waterfall, modified waterfall, spiral
Software development lifecycle model that allows for iteration back to the previous phase of development.
Waterfall
Software development lifecycle model that incorporates verification and validation into the waterfall model.
Modified waterfall
Software development lifecycle model that uses iterations of the entire process gradually refining the finished product.
Spiral
Five phases of the capability maturity model (CMM).
level 1 - initiating, level 2 - repeatable, level 3 - defined, level 4 - managed, level 5 - optimized
Five phases of the IDEAL model.
level 1 - initiating, level 2 - diagnosing, level 3 - establishing, level 4 - acting, level 5 - learning
Five generations of programming languages.
1st generation - machine language, 2nd generation - assembly language, 3rd generation - C, 4th generation - SQL, 5th generation - visual studio
Two types of high level languages.
Interpreted, compiled
Four components of an object oriented environment.
Attributes, methods, classes, instances
The number of rows in s table.
Cardinality
The number of columns in a table.
Degree
Any combination of attributes that uniquely identifies the rows in a table.
Candidate key
The candidate key selected by the database administrator to identify the rows of the table.
Primary key
Keys used to reference other tables in the same database.
Foreign key
Process used to ensure that the attributes in the table are dependent only on the primary key.
Normalization
Control that ensures that two processes don't modify the data at the same time.
Concurrency
Control that ensures that they foreign key values actually correspond to an entry in the referenced table.
Referential integrity
Control that ensures that groups of related statements either succeed or fail as a group.
Transaction
All transactions must meet four standard criteria.
Atomic, consistent, isolated, durable (ACID)
Three types of database attacks.
Aggregation, inference, SQL injection
Systems that attempt to use a series of rules to mimic the behavior of a human expert in decision making.
Expert systems
A common type of artificial intelligence system used to predict future events based on a large history of past events.
Neural network
Seven types of viruses.
File infector, companion, boot sector, multipartite, stealth, polymorphic, encrypting
Viruses that attach themselves to a file and spread when the file is executed.
File infector
Viruses that use file names similar to legitimate operating system file names but with different extensions to hide on the system and force execution.
Companion
Viruses that infect the part of the hard drive used by the operating system at boot time.
Boot sector
Viruses that combine attributes of file infector and boot sector viruses.
Multipartite
Viruses that use various techniques to hide their activity from antivirus software.
Stealth
Viruses that change from system to system in an attempt to avoid signature detection systems.
Polymorphic
Viruses that use cryptographic techniques to hide themselves from signature detection systems.
Encrypting
Similar to viruses and use many of the same infection vectors but spread from system to system without user intervention.
Worms
Malware that disguises itself as a legitimate program to trick the user into executing them but then perform malicious activity in the background,
Trojan horse
Malware that waits for a certain event to occur, then delivers its payload.
Logic bomb
Attacks that attempt to prevent the legitimate use of a system by disabling it in some way.
Denial of service
Attack that attempts to overflow the systems ability to handle the three way TCP handshake by initiating bit not completing a large number of handshakes.
SYN flood
Attack that uses overlapping fragments to confuse the TCP/IP stack of older OSs
Teardrop
Attack that leverages a large network of compromised systems to flood a target with requests.
Distributed denial of service
An attack which uses spoofed ICMP echo requests to trick a large number of remote systems into flooding a taegeted system with ICMP echo reply packets
Smurf
Attack that sends specially crafted packets with identical source and destination IP address/port pairs causing some operating systems to crash.
Land
Systems specifically designed to attract attackers in an attempt to study their activity and/or deflect them from attacking high value targets.
Honeypot
Networks of honeypots, commonly made up of varied operating systems and patch levels.
Honeynets
Monitored IP subnets that should have no legitimate activity and have no hosts authorized in the IP address range,
Darknet