Term
| What are the data base administrator roles? |
|
Definition
Used to assign user database account maintenance responsibility to users other than DBAs. may have the privileges to create user database accounts, assign specific database profiles to the user accounts and assign database roles. |
|
|
Term
| What is MS SQL Server Version 8 marketed as? |
|
Definition
|
|
Term
| Is SQL Server Version 8(SQL Server 2000) capable of being fully compliant with DoD security standards? |
|
Definition
|
|
Term
| Access permissions fall into what three categories? |
|
Definition
Statement Permissions Object Permissions Implied Permissions |
|
|
Term
| Once auditing is enabled at the database level, specific auditing instructions have to be issued from what? |
|
Definition
|
|
Term
| SQL server configuration options have a security impact on what? |
|
Definition
|
|
Term
| What are a few of the more important security parameters? |
|
Definition
Allow Updates C2 Audit Mode Remote Access Scan For Startup Procs |
|
|
Term
| What is a fully functional version of Microsoft SQL Server. |
|
Definition
| MSDE (Microsoft SQL Server Desktop Engine) |
|
|
Term
| Oracle Access Control provileges are devided into what two types? |
|
Definition
System privileges Object privileges |
|
|
Term
| Web servers have become the focus for individuals who wish to do what 3 things? |
|
Definition
| Steal, damage, or deny access |
|
|
Term
| What are the responsibilities of the IAM/IAO? |
|
Definition
Trained staff verify local policies are developed approved and posted. |
|
|
Term
| What are the responsibilities of the SA? |
|
Definition
| host operating system and will ensure the web server is configured IAW the product specific checklist. |
|
|
Term
| What are the responsibilities of the Web Manager? |
|
Definition
configure and manage web server Coordinate of placement and scripts Provide security guidance and training advise IAO of technical, operational or security problems with possable solutions |
|
|
Term
|
Definition
| Common Gateway Interface -a standard for interfacing applications with information servers |
|
|
Term
|
Definition
| Extends the ability of the server to respond to client events without the need for client/server communications. |
|
|
Term
| Windows DNS provides cryptografic authentication through the what? |
|
Definition
| Secure Dynamic Updates feture |
|
|
Term
| What does Windows Internet Naming Service do? |
|
Definition
|
|
Term
|
Definition
| Set up the forest in active directory and gives permissions to the exchange admin |
|
|
Term
| What is Installation Directory? |
|
Definition
| partition for the OS to reside. |
|
|
Term
|
Definition
| Gathers information about the user |
|
|
Term
|
Definition
| presents a user with ads based on trends for that user |
|
|
Term
| Symantec Norton AntiVirus Corporate Edition is also know as what? |
|
Definition
|
|
Term
| What does AntiVirus CE prtect? |
|
Definition
| protection from viruses that spread from hard drives, floppy disks, e-mail attachments, and other files that travel across networks. |
|
|
Term
| T/F Web Browsers are the client applications that communicate with web servers? |
|
Definition
|
|
Term
| T/F Data, HTML web pages, and files sent to the browser can contain malicious mobile code? |
|
Definition
|
|
Term
| The SA/IAO will ensure that the browser is configured to what? |
|
Definition
| To support current DoD mobile code policies |
|
|
Term
| Remote Access from any location is considered what? |
|
Definition
|
|
Term
| The risk of exposure to vulnerabilities, malicious attackers, and opportunistic individuals is significantly incressed with the use of what? |
|
Definition
|
|
Term
| What is the best means of protecting data on mobile devises? |
|
Definition
| Encrypting the files on the devise itself |
|
|
Term
| For a remote access VPN to be as secure as possible, the traffic should be what? |
|
Definition
| Encrypted and integrity protected |
|
|
Term
| What are the three approved cryptographic algorithims? |
|
Definition
| cryptographic hash functions, symmetric key algorithms, and asymmetric key algorithms |
|
|
Term
| What is function of the private key? |
|
Definition
| Decryption or to compute a signature |
|
|
Term
| Cryptography relies upon two basic components. What are they? |
|
Definition
|
|
Term
| What are Symmetric Key Algorithms? |
|
Definition
| Uses a single key for both encryption and decryption |
|
|
Term
| What are Asymmetric Algorithims? |
|
Definition
| Uses a public and a private key |
|
|
Term
|
Definition
| small part of message to verify the message |
|
|
Term
| How are the public and private key related in Asymmetric algorithims? |
|
Definition
|
|
Term
|
Definition
| Triple Data Encryption Algorithm- operates on blocks (chunks) of data during an encryption or decryption operation |
|
|
Term
|
Definition
| Certificate Issuing and Management Components- consists of the hardware, software and firmware that are responsible for issuing, revoking, and managing public key certificates. |
|
|
Term
| T/F In hierarchical models, a CA delegates trust when it certifies a subordinate? |
|
Definition
|
|