Domain 7: Systems and App Security Flashcards

1
Q

Pointer overflow attack

A

Similar to buffer overflow. Attackers uses Buffer OF techniques to change it to point to malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Directory transversal

A

Web attack to jump to higher level directories on web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Covert Channel

A

Any non-standard means of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQL Escape Characters

A

Attacker uses as part of an attack script in web form field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File infecting virus

A

Attacks executables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stealth virus

A

Masks itself as another type of program to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Retrovirus

A

Attacks AV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multipartite virus

A

Attacks different parts of the host such as boot sector, exe’s, and apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File extension attack

A

Using a long file name to hide a double extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Social engineering attack. Attack on hosts file or DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rogue SW

A

Trojan that works like ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Retina

A

Vuln scanning SW like Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System-key utility

A

Defense against windows based password cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Centralized Application management (CAM)

A

Virtual Desktops, SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COPE

A

Corporate Owned Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DED

A

Dedicated computing device. aka IOT

17
Q

Private cloud

A

Internal network with Virtualization benefits

18
Q

Managed File Transfer (MFT)

A

Transfer of data to, from, in between clouds securely and reliably regardless of data file size.

19
Q

Erasure coding

A

Parity system for cloud. aka Data dispersion

20
Q

Cloud storage-level encryption

A

Encryption w/ keys managed by vendor

21
Q

Volume storage encryption

A

Cloud storage with keys managed by data admin.

22
Q

Data haven

A

Data friendly storage with low regulation/law. Could be TOR

23
Q

Directive 95/46 EC

A

Predecessor to GDPR. Non-Binding

24
Q

GDPR

A

Unify protections in 28 EU countries. Affects data transfer, accountability, sanctions

25
Q

Data Protection Impact Assessments (DPIA)

A

Evaluation of “privacy by default” policy

26
Q

Pretexting

A

Obtaining info through false pretenses

27
Q

MapReduce and Hadoop

A

Methodologies of processing very large DB’s in parallel

28
Q

Data owner vs. Information owner

A

Data owner controls data on the input side. Info owner assumes control on the output side

29
Q

JeOS

A

Just Enough Operating System. For virtual appliances

30
Q

Host clustering

A

Host machines are logically or physically to share resources

31
Q

Storage clustering

A

Servers managed and interconnected together for performance, reliability, capacity boost.

32
Q

Loose coupled cluster

A

Storage cluster with JBOD

33
Q

Tight coupled cluster

A

Storage cluster provided by manufacturer.