Chapter 7 Risk Mitigation Controls Mark B Flashcards

1
Q

Attackers find a vulnerability on a website that allows them to select items from a shopping basket. When the authorized payment button is selected, there is a 500 ms delay. The attackers run a script that takes 200 ms and allows the final payment to be alerted. What is the vulnerability that has been targeted?

A. Buffer overflow
B. Integer overflow
C. Broken Authentication
D. Race Condition

A

D. Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attackers find a vulnerability on a websitte that allows them to select items from a shopping basket. There is a running total value for the basket. When items are added beyond a total of $9,999, the total displays a value starting from $0.00. What is the vulnerability that has been targeted?

A. Buffer overflow
B. Integer overflow
C. Broken authentication
D. Weak ciphers

A

B. Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What allows attackers to sniff traffic on a network and capture cookies sent over HTTP?

A. Improper headers
B. Poor exception handling
C. Certificate errors
D. Race conditions

A

C. Certificate errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What allows developers to maintain an inventory of all code libraries and licenses used in their application?

A. Weak cryptography implementations
B. Weak ciphers
C. Weak cipher suite implementations
D. Software composition analysis

A

D. Software composition analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Developers are reveiwing legacy applications written in the C programming language. This is due to a number of recent buffer overflow attackers against the application. They have replaced instances of gets() with fgets() and strcpy() with strcpy_s(). What has prompted this activity?

A. Use of unsafe functions
B. Third party libraries
C. Dependencies
D. Regression

A

A. Use of unsafe functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it called when developers no longer release security patches for their software applications?

A. End of support/end of life
B. Regression issues
C. Dependencies
D. Bankruptcy

A

A. End of support/end of life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of code that is not developed by a development team but is incorporated into many software builds?

A. Use of unsafe functions
B. Third party libraries
C. Dependencies
D. Regression

A

B. Third party libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when developers rely on a cloud provider API for full functionality of their software applications?

A. Use of unsafe functions
B. Third party libraries
C. Dependencies
D. Regression

A

C. Dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a software component has previously worked well but now proves to be slow or unresponsive, what is it known as?

A. Unsafe functions
B. Unsafe third party libraries
C. Software dependencies
D. Software regression bug

A

D. Software regression bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When considering input validation for your web application, where should the validation take place?

A. Client side
B. Flash
C. Server side
D. ActiveX

A

A. Client side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is runtime or interpreted code that can provide media rich web content within a web browser?

A. REST
B. Browser Extensions
C. ActiveX
D. HTML5

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is runtime orr interpreted code that can provide partial page updates (therefore saving bandwidth) when repositioning a map on screen?

A. AJAX
B. SOAP
C. Flash
D. ActiveX

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security professionals have found IOCs while reviewing their SIEM logs. The following commands were found from the application server logs:

../../../../etc/passwd

What type of activity did they see?

A. Directory traversal
B. XSS
C. CSRF
D. SQL injection

A

A. Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security professionals have found IOCs while reviewing SIEM logs. The following commands were fiund in the application server logs:

GET http://acmebank.com/transferfunds.do?acct=bobjones&amount=%400 HTTP/1.1

What type of activity did they see?

A. Injection
B. XML
C. LDAP
D. XSRF

A

A. Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

While reviewing web application firewall logs, security pros have found IOCs. THe following commands were found in the logs:

SELECT*FROM users WHERE username = “OR 1=1 -‘ AND password = ‘mypass1’

What type of activity did they see?

A. Injection
B. XML
C. LDAP
D. SQL

A

D. SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While executing malware in an isolated environment, malware has been found on previously unaffected systems. What is the likely cause?

A. Sandbox escape
B. VM hopping
C. VM Escape
D. Sandbox detonation

A

A. Sandbox escape

17
Q

Internet traffic has been rerouted causing outages for many large internet providers. Attackers have used default accounts to configure ISP routers. What technology or vector of attack has been used?

A. BGP
B. VLAN Hopping
C. LDAP
D. DDoS

A

A. BGP

18
Q

What type of attack will most likely be effective when untrained users are targeted?

A. Social Engineering
B. VLAN hopping
C. Hunts
D. DDoS

A

A. Social Engineering

19
Q

Security researchers need to understand APY bad actors by observing their tools, tactics and procedures. What would be the best tool for this?

A. Honeynet
B. Honeypot
C. Decoy files
D. Antivirus

A

A. Honeynet

20
Q
A