Exam 1 Review Flashcards
A data breach is one that ex-filtrates large amounts of sensitive data that was stored on some server
True
Overflowing a global variable is considered a stack overflow
False
A good example of a strongly typed language would be C
False
In regards to overflow exploits, you only need to worry about “ints” not “strings”
False
A “Canary Value” is used in the stack frame to keep track of overflow detection
True
When done deliberately as part of an attack on a system, the transfer of control could be to code of the attacker’s choosing
True
Buffer overflow exploits have been known since the SSL Heartbleed that occurred in 1971
False
A programmer can tell the operating system to not allow programs to overflow memory
False
Declaring variables as global stops all change of being able to overflow buffers
False
In order to stop overflow exploits, you can use a simple data validation technique
True
When using shell code or instructions that make up shell-code, who’s privileges will you be using?
Privileges of the host program.
The buffer in an overflow exploit could be located in which of the following
On the Stack, On the Heap, and In the Data Section
What moves addresses of stack, heap, and lib-c to make buffer overflow more difficult?
Address Space Layout Randomization
Stacks are used for which of the following?
Allocating memory for Local Variables, Parameters, and Control Information
The definition of shell code is:
Binary values corresponding to the desired machine instructions.
What is a NOP sled?
A sequence of instructions that do nothing to control program flow.
Best way to stop buffer/heap exploits?
Enforce boundary checking on all inputs
wrong answers - use pointers, tell the user how much data needs to be input
A stack buffer overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function’s stack frame. This form of attack is also referred to as:
Stack Smashing
____ is when a system is performing its intended functions without being degraded or impaired by changes or disruptions in its internal or external environments?
System Integrity
Which of the following are the main threat resources of cyber assets?
Nation-States, Cybercriminals, Hacktivists
Each layer of code needs appropriate hardening measures in place to provide appropriate security services
True
The default configuration for many operating systems usually maximizes security.
False
A very common configuration fault seen with Web and file transfer servers is for all the files supplied by the service to be owned by the same “user” account that the server executes as.
True
Backup and archive processes are linked and manager together
True
User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
False. (answer: message authentication)
Depending on the details of the overall authentication system, the registration authority issues some sort of electronic credential to the subscriber.
False. (credential provider)
An individual’s signature is not unique enough to use in biometric applications.
False
In a biometric scheme some physical characteristic of the individual is mapped to a digital representation.
True
Keylogging is a form of host attack.
False. (form of eavesdropping)