5 Flashcards

1
Q

Which of the following describes an application attack that relies on executing a library of code?
* Memory leak
* DLL injection
* Pointer dereference
* Buffer overflow

A

DLL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following fragments of input might indicate an LDAP injection attack attempt? (Select 2 answers)
* … AND password = ‘’ OR ‘1’ = ‘1’;
* administrator)(&)) ( Missed)
* …

 malicious script code 

* search.aspx?name=userName)(zone=*) ( Missed)
* … p@$$w0rd</password></user><user><name>attacker</name> ....</user>
A
  • administrator)(&))
  • search.aspx?name=userName)(zone=*)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following fragments of input might indicate an XML injection attack attempt?
* search.aspx?name=userName)(zone=*)
* … p@$$w0rd</password></user><user><name>attacker</name> ....
* administrator)(&))
* ... AND password = '' OR '1' = '1';
* ...

 malicious script code 
</user>
A

… p@$$w0rd</password></user><user><name>attacker</name> ....</user>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following terms describes an attempt to read a variable value from an invalid memory address?
* Buffer overflow
* Null-pointer dereference
* Integer overflow
* Memory leak

A

Null-pointer dereference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A dot-dot-slash attack is also referred to as:
* Disassociation attack
* On-path attack
* Directory traversal attack
* Downgrade attack

A

Directory traversal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following URLs is a potential indicator of a directory traversal attack?
* http://www.example.com/var/../etc/passwd
* http://www.example.com/var/www/../../etc/passwd
* http://www.example.com/var/www/files/../../../etc/passwd
* http://www.example.com/var/www/files/images/../../../../etc/passwd
* Any of the above

A

Any of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is called:
* IV attack
* SQL injection
* Buffer overflow
* Fuzz test

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A situation in which an application writes to an area of memory it is not supposed to have access to is referred to as:
* DLL injection
* Buffer overflow
* Memory leak
* Integer overflow

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A malfunction in a preprogrammed sequential access to a shared resource is described as:
* Race condition
* Buffer overflow
* Memory leak
* Pointer dereference

A

Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following terms refers to a vulnerability caused by race conditions?
* Mean time to failure
* Replay attack
* Mean time between failures
* Time-of-check to time-of-use

A

Time-of-check to time-of-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the programming aspects listed below are critical in secure application development process? (Select 2 answers)
* Patch management
* Input validation
* Password protection
* Error and exception handling
* Application whitelisting

A
  • Input validation
  • Error and exception handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:
* Zero-day vulnerability
* Improper input validation
* Default configuration
* Improper error handling

A

Improper input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following answers refers to a countermeasure against code injection?
* Fuzzing
* Input validation
* Code signing
* Normalization

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network replay attack occurs when an attacker intercepts sensitive user data and resends it to the receiver with the intent of gaining unauthorized access or tricking the receiver into unauthorized operations.
* True
* False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following are the characteristic features of a session ID? (Select 3 answers)
* Stored on a server
* A unique identifier assigned by the website to a specific user
* Contains user’s authentication credentials, e.g. username and password
* A piece of data that can be stored in a cookie, or embedded as an URL parameter
* Stored in a visitor’s browser
* A unique identifier assigned to a server

A
  • A unique identifier assigned by the website to a specific user
  • A piece of data that can be stored in a cookie, or embedded as an URL parameter
  • Stored in a visitor’s browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a session replay attack, an attacker steals a valid session ID of a user and resends it to the server with the intent of gaining unauthorized access or tricking the server into unauthorized operations.
* True
* False

A

True

17
Q

Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?
* Buffer overflow
* Pointer dereference
* Memory leak
* Integer overflow

A

Integer overflow

18
Q

Which type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions?
* XSRF
* CSRF
* XSS
* SSRF

A

SSRF

Server-side request forgery is a web security vulnerability that allows an attacker to cause the server-side application to make requests to an unintended location.

19
Q

Which of the following answers can be used to describe characteristics of a cross-site request forgery attack? (Select 3 answers)
* Exploits the trust a website has in the user’s web browser
* A user is tricked by an attacker into submitting unauthorized web requests
* Website executes attacker’s requests
* Exploits the trust a user’s web browser has in a website
* A malicious script is injected into a trusted website
* User’s browser executes attacker’s script

A
  • Exploits the trust a website has in the user’s web browser
  • A user is tricked by an attacker into submitting unauthorized web requests
  • Website executes attacker’s requests
20
Q

A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?
A. MFA
B. Lockout
C. Time-based logins
D. Password history

A

MFA

21
Q

A company wants to simplify the certificate management process. The company has a single domain with several dozen subdomains, all of which are publicly accessible on the internet. Which of the following BEST describes the type of certificate the company should implement?

A. Subject alternative name
B. Wildcard
C. Self-signed
D. Domain validation

A

Wildcard

22
Q
A

*.google.com

23
Q
A