Chpt 21 Flashcards

1
Q

What are the 4 propagation techniques used by viruses?

A
  1. File infection
  2. Service injection
  3. Boot sector infection
  4. Macro infection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is another name for time-of-check-to-time-to-use attacks?

A

Race conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a sign that an IP address is likely spoofed?

A

A packet is entering from the outside of the network with an internal IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common technique to protect against virus attacks?

A

Signature detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What attack is most commonly associated with APT attacks?

A

Zero day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What attacks allows an attacker to modify the contents of a systems memory?

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What character should be carefully treated with encountered as user input on the web?

A

‘ an apostrophe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What database tech can limit the potential for SQL attacks?

A

Stored procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What condition is necessary for a website to be used as a XSS attack?

A

Reflected input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most effective defense against XSS attacks?

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly