application defense II Flashcards

1
Q

unwanted and unsolicited emails is called

A

span

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a email server that accepts mail and forwards it to other mail servers

A

open SMTP relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a email pretending to be from a trusted organization asking to verify personal information and send money

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To secure e-mail, use either

A

secure multipurpose internet mail extensions (S/MIME)

pretty good privacy (PGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the process of preventing exploitation of vulnerabilities in software applications

A

application hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this application hard technique prevents spawning in a application and will not be able to perform process spawning attack.

A

Block process spawning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this application hard technique prevents executable files from modification by removing the write permissions given to applications

A

Control access to executable files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this application hard technique prevents sensitive file system by removing write permissions given to specific applications

A

Protect OS components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this application hard technique allow an administrator to bypass a specific hardening rule when an application has a legitimate need

A

use exceptions rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this application hard technique allows an administrator to identify potentially vulnerable applications and identify if an application is being exploited.

A

monitor logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a security feature prevents damages to your computer from viruses and other security threats

A

uses data execution prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this application hard technique applies to third-party application hardening

A

Implement third-party applications hardening tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a type of spam targeting of instant messaging (IM) services

A

spim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software implemented on a computer that executes programs like a physical machine.

A

virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a file created on a operating system and simulates a hard disk for the virtual machine.

A

virtual hard disk drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a thin layer of software that allows virtual machines to interact with the hardware without going through the host operating system.

A

hypervisor

17
Q

this attack occurs when software is downloaded and installed without explicit consent

A

drive by download

18
Q

this attack occurs when an attacker registers a domain names that correlate the common typographical errors made by users

A

URL hijacking

19
Q

this attack occurs when a variation of phishing attack are being directed at a specific organization or person

A

watering hole

20
Q

this attack occurs when the operating system or application does not properly enforce boundaries for how much and what type of data can be imputed

A

buffer overload

21
Q

this attack occurs when a computational operation by a running process results in a numeric value that exceeds the max size of the integer type used to store in memory

A

integer overflow

22
Q

this attack injects script into web pages

A

cross site scripting

23
Q

this attack occurs when unauthorized commands are transmitted from a user to a Web site that currently trusts the user

A

Cross-site Request Forgery ((CSRF/XSRF)

24
Q

this attack uses malicious content in an XML message to alter the intended logic of the application.

A

XML injection