Chpt 21 Flashcards
What are the 4 propagation techniques used by viruses?
- File infection
- Service injection
- Boot sector infection
- Macro infection
What is another name for time-of-check-to-time-to-use attacks?
Race conditions
What is a sign that an IP address is likely spoofed?
A packet is entering from the outside of the network with an internal IP.
What is the most common technique to protect against virus attacks?
Signature detection
What attack is most commonly associated with APT attacks?
Zero day exploits
What attacks allows an attacker to modify the contents of a systems memory?
Buffer overflow
What character should be carefully treated with encountered as user input on the web?
‘ an apostrophe
What database tech can limit the potential for SQL attacks?
Stored procedures
What condition is necessary for a website to be used as a XSS attack?
Reflected input
What is the most effective defense against XSS attacks?
Input validation