Chapter 4 Flashcards
What is the primary goal of OS hardening?
A) To enhance the system’s performance by optimizing hardware usage.
B) To make the system more secure by improving its design and coding.
C) To simplify the user interface for easier navigation.
D) To increase the system’s compatibility with various software applications.
To make the system more secure by improving its design and coding.
What type of OS is considered a trusted OS?
A) An OS that has been designed with OS hardening.
B) An OS that is compatible with the most software applications.
C) An OS that focuses on enhancing user interface features.
D) An OS that prioritizes high performance and fast processing speeds.
An OS that has been designed with OS hardening
What does application whitelisting/blacklisting involve?
A) Allowing or disallowing applications based on their performance metrics.
B) Requiring preapproval for an application to either run or not run.
C) Changing the user interface to enhance application usability.
D) Increasing system compatibility with a wide range of software.
Requiring preapproval for an application to either run or not run
What does whitelisting involve in the context of application security?
A) Permitting only specific applications that are pre-approved to run, while blocking or denying any not on the list.
B) Allowing all applications to run unless specifically blocked.
C) Automatically updating applications to the latest version without user intervention.
D) Granting access to applications based on their performance and compatibility.
Permitting only specific applications that are pre-approved to run, while blocking or denying any not on the list.(default-deny)
What does blacklisting involve in the context of application security?
A) Creating a list of unapproved software, while allowing any program not on this list to run.
B) Requiring pre-approval for specific applications to run, blocking any not on the approved list.
C) Automatically updating applications to the latest version without user intervention.
D) Granting access based on an application’s performance and compatibility.
Creating a list of unapproved software, while allowing any program not on this list to run.
(default-allow)
What is a sandbox in the context of application security?
A) A virtual environment that simulates different operating systems for testing purposes.
B) A feature that improves the performance and speed of the operating system.
C) A tool that automatically updates software applications to their latest versions.
D) A “container” where an application can run without affecting the underlying OS.
A “container” where an application can run without affecting the underlying OS.
What happens to actions that occur within a sandbox?
A) They are visible to other applications and the OS outside the sandbox.
B) They are logged and monitored by the OS for security purposes.
C) They do not affect other applications or the OS outside the sandbox.
D) They automatically update the OS to ensure compatibility.
They do not affect other applications or the OS outside the sandbox.
What happens to the contents of a sandbox when it is closed?
A) The contents are saved and can be accessed later.
B) The contents are archived for future reference.
C) The contents are not saved and are discarded.
D) The contents are automatically updated to reflect the latest changes.
The contents are not saved and are discarded
How does a sandbox differ from a virtual machine?
A) a virtual machine operates as a “computer within a computer,” running a full OS as an application on the main OS, with its contents saved for later use.
B) A sandbox allows a full OS to run independently, while a virtual machine limits the OS to a contained environment without saving changes.
C) A sandbox saves its contents for later use, while a virtual machine discards changes when closed.
D) A virtual machine runs applications in isolation, similar to a sandbox, but without the ability to save contents.
a virtual machine operates as a “computer within a computer,” running a full OS as an application on the main OS, with its contents saved for later use
How does a sandbox differ from a virtual machine?
A) A sandbox runs applications in a contained environment without affecting the main OS, and its contents are discarded when closed. In contrast, a virtual machine operates as a “computer within a computer,” running a full OS as an application on the main OS, with its contents saved for later use.
B) A sandbox allows a full OS to run independently, while a virtual machine limits the OS to a contained environment without saving changes.
C) A sandbox saves its contents for later use, while a virtual machine discards changes when closed.
D) A virtual machine runs applications in isolation, similar to a sandbox, but without the ability to save contents.
A sandbox runs applications in a contained environment without affecting the main OS, and its contents are discarded when closed. In contrast, a virtual machine operates as a “computer within a computer,” running a full OS as an application on the main OS, with its contents saved for later use
What does quarantine do with an attachment according to the organization’s policy?
A) It archives the attachment for future reference and informs the user of its location.
B) It removes the attachment and sends a cleaned version to the user or provides a URL to view, print, or delete the attachment from a secure computer.
C) It immediately deletes the attachment and notifies the user without providing further options.
D) It automatically downloads the attachment and scans it for viruses before delivery.
It removes the attachment and sends a cleaned version to the user or provides a URL to view, print, or delete the attachment from a secure computer
What do executable file attacks typically involve?
A) Tricking a vulnerable application into modifying or creating executable files on the system.
B) Encrypting all files on the system to prevent unauthorized access.
C) Automatically updating system files to prevent vulnerabilities.
D) Scanning the system for outdated software and notifying the user.
Tricking a vulnerable application into modifying or creating executable files on the system.
What is a defense strategy for protecting against executable file attacks?
A) Regularly updating executable files to the latest versions automatically.
B) Preventing the application from creating or modifying executable files that are necessary for its proper function.
C) Encrypting executable files to prevent unauthorized modifications.
D) Allowing the application to freely create or modify executable files to ensure optimal performance.
Preventing the application from creating or modifying executable files that are necessary for its proper function.
What does system tampering involve?
A) Using the vulnerable application to modify special sensitive areas of the operating system.
B) Automatically updating system components to improve performance.
C) Encrypting sensitive areas of the operating system to protect against unauthorized access.
D) Regularly scanning the system for vulnerabilities and applying patches.
Using the vulnerable application to modify special sensitive areas of the operating system
What is a defense strategy against system tampering?
A) Allowing applications to modify special areas of the OS to ensure proper functionality.
B) Regularly updating the operating system to patch vulnerabilities.
C) Restricting applications from modifying special areas of the OS.
D) Encrypting sensitive areas of the OS to prevent unauthorized access.
restricting applications from modifying special areas of the OS
What does process spawning involve in the context of application security?
A) Tricking the vulnerable application into spawning executable files on the system.
B) Automatically updating system processes to prevent security breaches.
C) Encrypting process files to prevent unauthorized access.
D) Regularly scanning processes for vulnerabilities and applying patches.
Tricking the vulnerable application into spawning executable files on the system
What is a root directory in the context of a web server’s file system?
A) A specific directory that restricts users to access only the root directory and its subdirectories.
B) A directory that grants users full access to all directories and files on the server.
C) A directory that automatically updates its contents based on user activity.
D) A backup directory that stores copies of files from all directories on the server.
A specific directory that restricts users to access only the root directory and its subdirectories
What is a directory traversal attack?
A) An attack that encrypts files in the root directory to prevent unauthorized access.
B) An attack that scans the server for vulnerabilities and automatically applies patches.
C) An attack that modifies the contents of the root directory to disrupt server operations.
D) An attack that exploits a weakness in a web application or server to allow access to restricted directories beyond the root directory.
An attack that exploits a weakness in a web application or server to allow access to restricted directories beyond the root directory
What is command injection in the context of moving to another directory on a server?
A) An unauthorized user viewing confidential files or entering commands to execute on the server.
B) An authorized user moving to another directory to improve server performance.
C) A process that automatically encrypts files in a directory for enhanced security.
D) A technique used to scan and update server directories for vulnerabilities
An unauthorized user viewing confidential files or entering commands to execute on the server
What is the primary cause of most insecure applications?
A) Issues with how the application was designed and written.
B) The hardware configuration of the server hosting the application.
C) The network bandwidth available to the application.
D) The frequency of software updates applied to the application.
Issues with how the application was designed and written.
What are the stages of general application development?
A) Design, Coding, Deployment, Maintenance
B) Planning, Prototyping, Integration, Release
C) Analysis, Implementation, Review, Optimization
D) Development, Testing, Staging, Production
Development, Testing, Staging, Production
What occurs during the development stage of application development?
A) The application is released to the end-users in a live production environment.
B) The application is tested for bugs and performance issues.
C) The application is deployed to a staging environment for further review.
D) The requirements for the application are established, and it is confirmed that the application meets the intended business needs before actual coding begins.
The requirements for the application are established, and it is confirmed that the application meets the intended business needs before actual coding begins.