Common Security Breaches Flashcards

1
Q

What is Cross-site scripting?

A

malicious scripts are injected into otherwise trusted websites.
an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end-user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a SQL injection attacks?

A

The hacker inputs, or injects, malicious SQL code — a form of malware known as the payload — on the website and fools it into delivering that code to its database as a legitimate query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a DOS attack

A

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of a DOS attack

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a buffer overflow?

A

an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a man in a middle attack?

A

an eavesdropping attack where a hacker injects himself in the middle of a transfer of two legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some types of Man in the Middle attacks?1

A

Spoofing
Email Hijacking
Stealing Browser Cookies
DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you detect MiTM attacks?

A

Packet analyzer like wire shark to inspect packets for interferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to mitigate SQL attacks?

A

Back up from storage or using data correction analysis to inspect and replace certain values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you mitigate DDOS attacks?

A

by break up or deflecting the malicious traffic to the out layer of the network perimeter using a firewall tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a DDOS attack?

A

disrupt the normal traffic of a targeted server or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly