1.3 Analyze potential indicators associated with application attacks Flashcards
1
Q
Privilege escalation
A
2
Q
Cross-site scripting
A
3
Q
Injections
-Structured query language (SQL)
A
4
Q
Injections
-Dynamic-link library (DLL)
A
5
Q
Injections
-Lightweight Directory Access Protocol (LDAP)
A
6
Q
Injections
-Extensible Markup Language (XML)
A
7
Q
Pointer/object dereference
A
8
Q
Directory traversal
A
9
Q
Buffer overflows
A
10
Q
Race conditions
-Time of check/time of use
A
11
Q
Error handling
A
12
Q
Improper input handling
A
13
Q
Replay attack
-session replays
A
14
Q
Integer overflow
A
15
Q
Request forgeries
-Server-side
A
16
Q
Request forgeries
-Cross-site
A
17
Q
Application programming interface (API) attacks
A
18
Q
Resource exhaustion
A
19
Q
Memory leak
A
20
Q
Secure Sockets Layer (SSL) stripping
A
21
Q
Driver manipulation
-Shimming
A
22
Q
Driver manipulation
-Refactoring
A