9.4 Final Assessment Flashcards
Service Desk is receiving complaints about users not being able to connect to the wireless network. After some analysis, you find indications of a wireless attack designed to block Wi-Fi signals. Which best describes this attack?
Jamming
Your organization requires that you explain to the software development team that they must take precautions not to allow inputs of this kind of text: ‘ or 1=1–. What attack is related to this text?
SQL injection
Your websites need protection against cross-site scripting and SQL injection. Which best describes a practice for defending against those two specific attacks?
Input validation
You instruct developers about a type of attack that exploits site vulnerabilities using the Document Object Model (DOM). What best describes this type of attack?
XSS
Software development teams use defined logic to avoid the condition of a pointer returning NULL because this may allow threat actors to run arbitrary code. What best describes the application behavior in this situation?
A dereference exception
Spam over Internet messaging services is known as?
SPIM
Unusual outbound network traffic, geolocation oddities, and high database reads are examples of what threat intelligence key element?
Indicators of compromise
Providers like SpamHaus and VirusTotal are examples of what type of threat intelligence source?
Open Source Intelligence (OSINT)
What bad programming practice can cause a web application vulnerability concerning invalid data?
Improper input handling
You have received reports from some users on your network that their financial credentials have been stolen. All of them use the same financial organization for their personal banking. The users report that they visited a fake bank website, and their logins were compromised. All the website’s bank visits were made from your organization’s network, and all of them said they typed in the correct URL. What is the most likely explanation for this situation?
DNS poisoning
Mapping wireless networks while driving is known as:
War driving
You have received reports that certain OS versions might produce memory leaks. Why is that potential condition a security issue?
It may signal malicious processes
During a scan review of the infrastructure, you found a server reporting the Internet Information Server is vulnerable to an exploit reported by the manufacturer months ago. This is despite your belief that the server was fully patched. After checking to see if IIS is missing patches, you find that it is indeed fully patched. What could be the cause of this discrepancy?
A false positive
You have been assigned as the network security administrator for a company. After some analysis, you discover the company’s networks have sustained a series of advanced attacks over a period of time. Which of the following options describes this attack best?
APT
Entering JavaScript into an input text box to enter text that will be viewed by other users is an example of what type of attack?
Cross-site scripting