1.3 Analyze potential indicators associated with application attacks Flashcards

1
Q

Privilege escalation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cross-site scripting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Injections
-Structured query language (SQL)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Injections
-Dynamic-link library (DLL)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Injections
-Lightweight Directory Access Protocol (LDAP)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Injections
-Extensible Markup Language (XML)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pointer/object dereference

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Directory traversal

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Buffer overflows

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Race conditions
-Time of check/time of use

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Error handling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Improper input handling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Replay attack
-session replays

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integer overflow

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Request forgeries
-Server-side

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Request forgeries
-Cross-site

A
17
Q

Application programming interface (API) attacks

A
18
Q

Resource exhaustion

A
19
Q

Memory leak

A
20
Q

Secure Sockets Layer (SSL) stripping

A
21
Q

Driver manipulation
-Shimming

A
22
Q

Driver manipulation
-Refactoring

A