Shared Flashcard Set

Details

NSVT4
Navy Course
40
Computer Networking
Professional
02/13/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
What are the data base administrator roles?
Definition
Used to assign user database account maintenance responsibility to users other than DBAs.
may have the privileges to create user database accounts, assign specific database profiles to the user accounts and assign database roles.
Term
What is MS SQL Server Version 8 marketed as?
Definition
SQL Server 2000
Term
Is SQL Server Version 8(SQL Server 2000) capable of being fully compliant with DoD security standards?
Definition
yes
Term
Access permissions fall into what three categories?
Definition
Statement Permissions
Object Permissions
Implied Permissions
Term
Once auditing is enabled at the database level, specific auditing instructions have to be issued from what?
Definition
A DBA account
Term
SQL server configuration options have a security impact on what?
Definition
The database
Term
What are a few of the more important security parameters?
Definition
Allow Updates
C2 Audit Mode
Remote Access
Scan For Startup Procs
Term
What is a fully functional version of Microsoft SQL Server.
Definition
MSDE (Microsoft SQL Server Desktop Engine)
Term
Oracle Access Control provileges are devided into what two types?
Definition
System privileges
Object privileges
Term
Web servers have become the focus for individuals who wish to do what 3 things?
Definition
Steal, damage, or deny access
Term
What are the responsibilities of the IAM/IAO?
Definition
Trained staff
verify local policies are developed approved and posted.
Term
What are the responsibilities of the SA?
Definition
host operating system and will ensure the web server is configured IAW the product specific checklist.
Term
What are the responsibilities of the Web Manager?
Definition
configure and manage web server
Coordinate of placement and scripts
Provide security guidance and training
advise IAO of technical, operational or security problems with possable solutions
Term
What is CGI?
Definition
Common Gateway Interface -a standard for interfacing applications with information servers
Term
What does JavaScript do?
Definition
Extends the ability of the server to respond to client events without the need for client/server communications.
Term
Windows DNS provides cryptografic authentication through the what?
Definition
Secure Dynamic Updates feture
Term
What does Windows Internet Naming Service do?
Definition
Same thing as DNS
Term
What is ForestPrep?
Definition
Set up the forest in active directory and gives permissions to the exchange admin
Term
What is Installation Directory?
Definition
partition for the OS to reside.
Term
What is Spyware?
Definition
Gathers information about the user
Term
What is adware?
Definition
presents a user with ads based on trends for that user
Term
Symantec Norton AntiVirus Corporate Edition is also know as what?
Definition
AntiVirus CE
Term
What does AntiVirus CE prtect?
Definition
protection from viruses that spread from hard drives, floppy disks, e-mail attachments, and other files that travel across networks.
Term
T/F Web Browsers are the client applications that communicate with web servers?
Definition
T
Term
T/F Data, HTML web pages, and files sent to the browser can contain malicious mobile code?
Definition
T
Term
The SA/IAO will ensure that the browser is configured to what?
Definition
To support current DoD mobile code policies
Term
Remote Access from any location is considered what?
Definition
Un-trusted
Term
The risk of exposure to vulnerabilities, malicious attackers, and opportunistic individuals is significantly incressed with the use of what?
Definition
Always-on technologies
Term
What is the best means of protecting data on mobile devises?
Definition
Encrypting the files on the devise itself
Term
For a remote access VPN to be as secure as possible, the traffic should be what?
Definition
Encrypted and integrity protected
Term
What are the three approved cryptographic algorithims?
Definition
cryptographic hash functions, symmetric key algorithms, and asymmetric key algorithms
Term
What is function of the private key?
Definition
Decryption or to compute a signature
Term
Cryptography relies upon two basic components. What are they?
Definition
An algorithm and a key
Term
What are Symmetric Key Algorithms?
Definition
Uses a single key for both encryption and decryption
Term
What are Asymmetric Algorithims?
Definition
Uses a public and a private key
Term
What is a hash function?
Definition
small part of message to verify the message
Term
How are the public and private key related in Asymmetric algorithims?
Definition
Mathematically
Term
What is TDEA?
Definition
Triple Data Encryption Algorithm- operates on blocks (chunks) of data during an encryption or decryption operation
Term
What is CIMC?
Definition
Certificate Issuing and Management Components- consists of the hardware, software and firmware that are responsible for issuing, revoking, and managing public key certificates.
Term
T/F In hierarchical models, a CA delegates trust when it certifies a subordinate?
Definition
T
Supporting users have an ad free experience!