application defense Flashcards

1
Q

a programming language designed to handle the occurrence of exceptions

A

error and exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

special conditions that change the normal flow of program executions

A

exceptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the process of ensuring that a programs operates on clean, correct, and useful data is called

A

input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this mode makes it more difficult for malicious software to be installed on the computer

A

enable protected mode from internet explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

it is used by internet explorer to control add-ons

A

ActiveX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

text files, stored on a computer to save information about your preferences, browser settings, and web page preferences

A

cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cookies used by the site you are visiting

A

first party cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cookies placed by sites linked to the site you are visiting

A

third party cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software that allows users to share contents and access contents shared by other users

A

peer-to-peer (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this attack uses LDAP statements with arbitrary commands to exploit Web-based applications with access to a directory service.

A

LDAP injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this attack injects and executes unwanted commands on the application

A

command injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this attack includes database commands and those commands subsequently execute on the server.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this attacked forces a program to load a dynamic-link library (DLL).

A

DLL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this attack uses specific characters to traverse to the parent directory in a file system

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the process of including invalid data in an HTTP response header.

A

Header manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

this attack exploits computer application vulnerabilities before they are known and patched by the application’s developer

A

Zero-day

17
Q

this attack exploits vulnerabilities in client applications that interact with a malicious server

A

Client-side

18
Q

if run-time failures within if the code doesn’t produce memory leaks, garbled data, or invalid output; the application code is considered to be

A

exception-safe

19
Q

a software testing technique that detects security problems by providing invalid, unexpected, or random data to the inputs of an application is called

A

fuzz testing

20
Q

a systematic examination of an application’s source code is called

A

code review

21
Q

a set of requirements to establish a standard configuration for all systems.

A

baselines

22
Q

the process of testing an application under development

A

configuration testing