Lesson 14: Summarizing Secure Application Concepts Flashcards
An attacker compromises a Linux host, installing a web shell as a backdoor. If the attacker gained access to the host through a connection the host established, what type of attack has occurred?
A. Man-in-the-Browser (MitB)
B. Reverse shell
C. Rootkit
D. Session hijacking
B
Which of the following is NOT a scripting language?
A. regex
B. PowerShell
C. JavaScript
D. Python
A
Analyze types of vulnerabilities and summarize a zero-day exploit.
A. A design flaw that can cause the application security system to be circumvented.
B. A vulnerability that is capitalized on before the developer knows about it.
C. An attack that passes invalid data to an application.
D. An attack that passes data to deliberately overflow the buffer, that the application reserves to store the expected data.
B
Which malicious code indicator is a minimal program designed to exploit a buffer overflow?
A. Credential dumping
B. Persistence
C. Lateral movement/insider attack
D. Shellcode
D
Which scripting language is the preferred method of performing Windows administration tasks?
A. Javascript
B. Python
C. Ruby
D. Powershell
D
Identify the type of attack that occurs when the outcome from execution process are directly dependent on the order and timing of certain events, and those events fail to execute in the order and timing intended by the developer.
A. Stack overflow
B. Integer overflow
C. Race conditions
D. Dynamic Link Library (DLL) injection
C
A threat actor programs an attack designed to invalidate memory locations to crash target systems. Which statement best describes the nature of this attack?
A. The attacker created a null pointer file to conduct a dereferencing attack.
B. The attacker programmed a dereferencing attack.
C. The attacker programmed a null pointer dereferencing exception.
D. The attacker created a race condition to perform a null pointer dereferencing attack.
C
A system administrator is working to restore a system affected by a stack overflow. Analyze the given choices and determine which overflow vulnerability the attacker exploited.
A. An attacker changes the return address of an area of memory used by a program subroutine.
B. An attacker overwrites an area of memory allocated by an application to store variables.
C. An attacker exploits unsecure code with more values than an array expects.
D. An attacker causes the target software to calculate a value that exceeds the set bounds.
A
Evaluate the Agile paradigm within a Software Development Lifecycle (SDLC) to determine which statement demonstrates the idea of continuous tasks.
A. Devising an application’s initial scope and vision for the project
B. Prioritizing the requirements and work through the cycles of designing, developing, and testing
C. Releasing well-tested code in smaller blocks
D. Perform the final integration and testing of the solution
C
Compare and contrast the types of Cross-Site Scripting (XSS) attacks, and select the option that accurately distinguishes between them.
A. Reflected and stored XSS attacks exploit client-side scripts, while the DOM is used to exploit vulnerabilities in server-side scripts.
B. Reflected and stored XSS attacks exploit server-side scripts, while the DOM is used to exploit vulnerabilities in client-side scripts.
C. Reflected and DOM attacks exploit server-side scripts, while a stored attack exploits vulnerabilities in client-side scripts.
D. Nonpersistent and persistent attacks exploit client-side scripts, while the DOM is used to exploit vulnerabilities in server-side scripts.
B
Which method might an attacker use to redirect login via information gained by implementing JavaScript on a webpage the user believes is legitimate?
A. Man-in-the-Browser (MitB)
B. Confused deputy
C. Reflected
D. Clickjacking
D
Which cookie attribute can a security admin configure to help mitigate a request forgery attack?
A. Secure
B. HttpOnly
C. SameSite
D. Cache-Control
C
An employee is attempting to install new software they believe will help them perform their duties faster. When the employee tries to install the software, an error message is received, stating they are not authorized to install the software. The employee calls the help desk for assistance. Evaluate the principles of execution control to conclude what has most likely occurred in this scenario.
A. The company is utilizing allow list control, and the software is included in the list.
B. The software is malicious, and execution control has identified the virus and is blocking the installation.
C. The company is utilizing allow list control, and the software is not included in the list.
D. The company is utilizing block list control, and the software is not included in the list.
C
Which type of attack disguises the nature of malicious input, preventing normalization from stripping illegal characters?
A. Fuzzing
B. Canonicalization
C. Code reuse
D. Code signing
B
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor’s backdoor to restart if the host reboots or the user logs off?
A. Persistence
B. Credential dumping
C. Shellcode
D. Lateral movement/inside attacker
A