Chapter 3 Flashcards

1
Q

Acronym for API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DOM

A

Document Object Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LDAP

A

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RPC

A

Remote Procedure Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAM

A

Windows Security Account Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TOC/TOU

A

Time of Check / Time of Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

XML

A

Extensible Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XSRF

A

Cross Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XSS

A

Cross Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most Cyber attacks begin at a ___ level associated with an ordinary user

A

Ordinary User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Problem with weak validation?

A

1 cause behind most overflows, injection attacks and canonical structure errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Resource Exhaustion?

A

A state where a system doesn’t have the resources it needs to continue to function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why did Microsoft reduce the number of processes and services that run in elevated mode in its operating systems?

A

Blocking privilege escalation is an important defensive step in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a memory leak?

A

When a program doesn’t dump it’s unused memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Another name for input validation?

A

Input Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are stored procedures?

A

Functions or SQL shortcuts or macros

21
Q

Three methods an attacker can use to achieve privilege escalation?

A
  1. Use existing privileges to steal a better set of credentials 2. Exploiting vulnerabilities or weaknesses in processes that are running with escalated privileges. 3.
22
Q

SQL Injection attack?

A

Changing the where statement to ‘ or 1=1 -

23
Q

Persistent XSS attack?

A

Where XSS script is stored on the server

24
Q

Non Persistent XSS attack

A

Script is not stored on server but is injected and passed to the server

25
Q

DOM Based XSS attack

A

XSS script is executed in the browser as opposed to the server

26
Q

Pass the Hash attack?

A

Attacker grabs the hash used to authenticate and then passes or injects the hash in place of a password.

27
Q

What three languages make up the DOM

A
28
Q

What is TOC/TOU attack?

A

A time of check time of use attack is one that takes advantage of a separation between the time a program checks a value and when it uses a value.

29
Q

What is meant by the use of single or double quotes in SQL?

A

Double quotes are used to indicate identifiers within the database, which are objects like tables, column names, and roles. In contrast, single quotes are used to indicate string literals.

30
Q

What is a pointer?

A

A construct that refers to the memory location that holds the variable as opposed to a variable.

31
Q

What is pointer dereferencing?

A
32
Q

What is a race condition?

A
33
Q

How is a directory traversal performed?

A
34
Q

What is SSL stripping?

A
35
Q

What is shimming?

A
36
Q

What is refactoring?

A
37
Q

What is a memory leak?

A
38
Q

What is a buffer overflow?

A
39
Q

What is an integer overflow?

A
40
Q

What is a server-side request forgery?

A
41
Q

What is driver manipulation?

A
42
Q

Why do modern Microsoft operating systems perform driver signing?

A
43
Q

Provide an example of XSRF?

A
44
Q

What is an API attack?

A
45
Q

How does a replay attack occur?

A
46
Q

What is a DLL?

A
47
Q

What is a DLL injection?

A
48
Q

What is XML?

A
49
Q

What is an XML attack?

A