1. Which of the following is not an element of databasetransaction management that is commonly found in...
Question:
1. Which of the following is not an element of databasetransaction management that is commonly found in DBMS products?
- Checkpoints
- Rollback function
- Normalization
- Commit statements
2. What term refers to a collection of related data items?
- Attribute
- Tuple
- Domain
- Aggregation
3. What proxy-like interface can application designers use inorder to allow anyone using their software to select any databaseproduct to store the data needed by the application?
- ODBC
- OCSP
- HMAC
- WTLS
4. What is the fifth stage in the IDEAL model?
- Initiating
- Examining
- Action
- Learning
5. A virus that is able to alter its appearance in order toavoid detection is known as?
- Common virus
- Armored
- Stealth
- Polymorphic
6. What is the best preventative technique against bufferoverflow attacks?
- IPS
- Input condition checks in the original source code
- Auditing
- Hash based integrity monitoring
7. An undocumented command sequences that allow individuals withknowledge to bypass normal access restrictions is known aswhat?
- Keylogger
- Sniffer
- Tailgating
- Backdoor
8. When an attacker breaches a system by cracking the passwordof a regular user account, what is often the next step in theattack/intrusion?
- Privilege escalation
- Disabling auditing
- Changing system settings
- Installing remote control tools
9. A list of all the significant events that occur in anapplication is known as:
- Audit log
- Replay log
- Export file
- Data dump
10. A security manager wishes to objectively measure thematurity of security processes in his organization. Which modelshould be used for this evaluation?
- SSE-CMM
- SEI-CMM
- Common Criteria
- TCSEC
Fraud examination
ISBN: 978-0538470841
4th edition
Authors: Steve Albrecht, Chad Albrecht, Conan Albrecht, Mark zimbelma