Lesson 11: Enhance Application Security Capabilities Flashcards

1
Q

What secure protocols should be used for data transmission?

A

HTTPS, SMTPS, SFTP, FTPS, LDAPS, and DNSSEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocols should be avoided due to insecurity?

A

Avoid insecure options (e.g., HTTP, Telnet) and implement encryption with industry-standard libraries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of using TLS 1.2 and 1.3?

A

Modern TLS protocols (1.2 and 1.3) secure communications, replacing outdated SSL versions.

Cipher suites define encryption and hashing algorithms; TLS 1.3 simplifies this for enhanced security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does LDAPS secure directory services?

A

Use LDAPS (port 636) or LDAP with SASL and STARTTLS to secure directory access. It does this by encrypting LDAP traffic using TLS/SSL.

Block anonymous/simple authentication and apply access control policies to manage permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of secure FTP alternatives?

A

SFTP: Uses SSH (port 22).

FTPS/FTPES: Secures data transfer using SSL/TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can email services be secured?

A

Secure email with SMTPS, POP3S, IMAPS, and protocols like:

SPF: Validates sender IP.

DKIM: Verifies email integrity.

DMARC: Ensures email authenticity and provides reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What tools support DNS filtering?

A

Pi-hole and OpenDNS

They block malicious domains, while DNSSEC validates DNS responses and prevents spoofing/poisoning attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What coding frameworks should you follow for secure development?

A

OWASP Top 10 and Microsoft SDL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are key secure coding practices?

A

Input Validation: Prevent injection attacks.

Static Code Analysis: Use tools like SonarQube or Fortify to identify vulnerabilities pre-deployment.

Code Signing: Digitally sign software to verify integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some web application protections?

A

Error Handling: Design exception handlers to avoid leaking sensitive information.

Memory Management: Prevent arbitrary code attacks by avoiding insecure practices.

Client/Server Validation: Use both client-side (quick checks) and server-side (secure, final validation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What key practices harden cloud environments?

A

Encryption for data at rest/in transit.

Regular monitoring, audits, and penetration tests.

Role-based least privilege policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are essential features of application monitoring and logging?

A

Generating meaningful logs for audits and incident response.

Real-time alerts for events like repeated login failures or unusual data transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does software sandboxing achieve?

A

Isolates running processes to minimize risks of malicious activity.

Examples include:
Browser Sandboxing: Separates browser tabs to protect against malicious code.

VMs & Containers: Provides isolated environments for applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of software sandboxing tools?

A

Cuckoo Sandbox: Executes and analyzes potential malware in isolated environments.

Joe Sandbox: Web-accessible sandbox using machine learning for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly