Domain 1.6 - Explain the impact associated with types of vulnerabilities. Flashcards
Embedded systems
These can be chips within Internet of Things (IoT) devices or controllers in manufacturing equipment.
Improper Input Handling
Poorly handled input is a leading cause behind critical vulnerabilities that exist in systems and applications.
Improper Error Handling
The most common problem is when detailed internal error messages such as stack traces, database dumps, and error codes are displayed to the user or attacker
Misconfiguration/Weak Configuration
This can be as simple as failing to change default settings or default passwords. Can be a matter of not having the appropriate training.
Default Configuration
In many cases this is one of the easiest vulnerabilities to exploit.
What is a form of Denial-of-Service attack where you make a system continuously allocate additional resources until the system hangs or crashes?
Resource Exhaustion
What is typically the weakest point in an organizations security posture?
Untrained Users
Name a vulnerable business process.
Failure to perform background checks properly or to verify vendors is a vulnerability.
Acquiring software from suspect sources is a vulnerability.
802.11i pertains to one thing for the test.
WPA2 - which is a form of encryption for wireless.
Memory leak
It would not release the RAM.
Buffer overflow
Someone is trying to send too many packets or too large of packets to your network.
System Sprawl
As the network grows, it becomes more difficult to track all the equipment and software on the network. This can lead to undocumented assets.
Zero Day
An exploit that has yet to be patched. whether exploited or not.
Denise is testing an application that is multithreaded. Which of the following is a specific concern for multithreaded applications?
A. Input validation
B. Memory overflow
C. Race conditions
D. Unit testing
C. Race conditions
A user downloaded and installed a new software application from a questionable source that resulted in the installation of a Trojan Horse. What vulnerability is MOST likely?
A. Business Process
B. Weak Encryption Cypher
C. Race conditions
D. Faulty Network Design
A. Business Process