A. Virus
B. Worm
C. Trojan horse
D. Logic bomb
D. Logic bombs are malicious code objects programmed to lie dormant until certain logical conditions, such as a certain date, time, system event, or other criteria, are met. At that time, they spring into action, triggering their payload.
A. Agent
B. Worm
C. Applet
D. Browser
A. Intelligent agents, also called bots, are code objects programmed to perform certain operations on behalf of a user in their absence.
A. Release control
B. Configuration control
C. Request control
D. Change audit
C. The request control provides users with a framework to request changes and developers with the opportunity to prioritize those requests.
A. Worms infect a system by overwriting data on storage devices.
B. Worms always spread from system to system without user intervention.
C. Worms always carry a malicious payload that impacts infected systems.
D. All of the above.
B. The major difference between viruses and worms is that worms are self-replicating, whereas viruses require user intervention to spread from system to system. Both viruses and worms are capable of carrying malicious payloads.
A. Visual Basic
B. C
C. Java
D. All of the above
D. Microsoft’s ActiveX technology supports a number of programming languages, including Visual Basic, C, C++, and Java. On the other hand, only the Java language can be used to write Java applets.
A. Content-dependent
B. Context-dependent
C. Semantic integrity mechanisms
D. Perturbation
A. Content-dependent access control is focused on the internal data of each field.
A. Candidate key
B. Primary key
C. Foreign key
D. Super key
C. Foreign keys are used to enforce referential integrity constraints between tables that participate in a relationship.
A. Inference
B. Contamination
C. Polyinstantiation
D. Aggregation
D. In this case, the process the database user is taking advantage of is aggregation. Aggregation attacks involve the use of specialized database functions to combine information from a large number of database records to reveal information that may be more sensitive than the information in individual records would reveal.
A. Inference
B. Manipulation
C. Polyinstantiation
D. Aggregation
C. Polyinstantiation allows the insertion of multiple records that appear to have the same primary key values into a database at different classification levels.
A. Volatile
B. Sequential access
C. Real memory
D. Primary memory
B. Random access memory (RAM) allows for the direct addressing of any point within the resource. A sequential access storage medium, such as a magnetic tape, requires scanning through the entire media from the beginning to reach a specific address.
A. A series of weighted layered computations
B. Combined input from a number of human experts, weighted according to past performance
C. A series of “if/then” rules codified in a knowledge base
D. A biological decision-making process that simulates the reasoning process used by the human mind
C. Expert systems utilize a knowledge base consisting of a series of “if/then” statements to form decisions based upon the previous experience of human experts.
A. PIX
B. ID10T
C. AAFID
D. NIDES
D. The Next-Generation Intrusion Detection Expert System (NIDES) is an expert-system-based intrusion detection system. PIX is a firewall, and ID10T and AAFID are intrusion detection systems that do not utilize expert systems.
A. SDLC
B. ODBC
C. DSS
D. Abstraction
B. ODBC acts as a proxy between applications and the backend DBMS.
A. Static testing
B. Dynamic testing
C. Cross-site scripting testing
D. Black box testing
A. In order to conduct a static test, the tester must have access to the underlying source code.
A. Level 0
B. Level 1
C. Level 2
D. Level 3
A. The security kernel and reference monitor reside at Level 0 in the ring protection scheme, where they have unrestricted access to all system resources.
A. Aggregation
B. Inference
C. Contamination
D. Polyinstantiation
C. Contamination is the mixing of data from a higher classification level and/or need-to-know requirement with data from a lower classification level and/or need-to-know requirement.