Day 1 1-38 Flashcards
1.1 Which of these organizations regulates millions of web transactions every day, and provides guidelines for protecting PII (Personally Identifiable Information)?
A.Institute of Electrical and Electronics Engineers (IEEE)
B.Payment Card Industry (PCI)
C.International Security Industry Organization (ISIO)
D.Center for Disease Control (CDC)
B
1.2 Which is the best description of a “Blind” SQL Injection vulnerability?
A. The request to the web server is not visible to the administrator of the vulnerable application.
B. The attack is called “Blind” because, although the application properly filters user input, it is still vulnerable to code injection.
C. The successful attack does not show an error message to the administrator of the affected application.
D. The vulnerable application does not display errors with information about the injection results to the attacker.
D
1.3 What is the most common place that anti-virus programs check for viruses?
A. Boot Sector
B. Deleted Files
C. Windows Process List
D. Password Protected Files
A
1.4 Which is the best way to sanitize user input before passing it to your back-end SQL server?
A. Validate web content input for query strings.
B. Validate web content input with scanning tools.
C. Validate web content input for type, length, and range.
D. Validate web content input for extraneous queries.
C
1.5 What is it called when you can type
alert(“Gotchya, sucka!")into a web page, and afterwards a pop-up box appears on the screen with the text: “Gotchya, sucka!”?
A. Buffer overflow
B. Cross-site request forgery
C. Distributed denial of service
D. Cross-site scripting
D
1.6 What is it called when you reduce the attack surface of a system by uninstalling all un-necessary software and services, and install all patches and updates?
A. Stealthing
B. Hardening
C. Windowing
D. Harvesting
B
1.7 Which tool would you use to comply with PCI Requirement 11?
A. Truecrypt
B. Sub7
C. Nessus
D. Clamwin
C
1.8 Which type of attack can be mitigated by using several layers of anti-virus defense, such as mail-server and desktop anti-virus scanning?
A. Forensic attack
B. ARP spoofing attack
C. Social engineering attack
D. Scanning attack
C
1.9 Which condition would make a web application vulnerable to Cross-Site Request Forgery (CSRF)?
A. The victim user must open the malicious link with an Internet Explorer prior to version 8.
B. The session cookies generated by the application do not have the HttpOnly flag set.
C. The victim user must open the malicious link with a Firefox prior to version 3.
D. The web application does not use random tokens.
D
1.10 What is the standard that provides testing labs with a set of requirements for evaluating IT products?
A. Blue Book
B. ISO 26029
C. Common Criteria
D. The Wassenaar Agreement
C
1.11 How often does the Payment Card Industry Data Security Standard (PCI-DSS) require companies to perform penetration testing?
A. At least once a year and after any significant upgrade or modification
B. At least once every three years or after any significant upgrade or modification
C. At least twice a year or after any significant upgrade or modification
D. At least once every two years and after any significant upgrade or modification
A
1.12 What service does the Open Web Application Security Project (OWASP) provide to help us secure our web applications?
A. An extensible security framework named COBIT
B. A list of flaws and how to fix them
C. Web application patches
D. A security certification for hardened web applications
B
1.13 If you want to see if a web site is vulnerable to SQL injection attacks, what is the first character you should use?
A. Semicolon
B. Single quote
C. Exclamation mark
D. Double quote
B
1.14 Which of the following laws requires the CEO to sign statements verifying the accuracy and completeness of corporate financial reports?
A. Sarbanes-Oxley Act (SOX)
B. Gramm-Leach-Bliley Act (GLBA)
C. Fair and Accurate Credit Transactions Act (FACTA)
D. Federal Information Security Management Act (FISMA)
A
1.15 Which type of access control do routers and firewalls use to control network access?
A. Mandatory
B. Discretionary
C. Rule-based
D. Role-based
C