Lesson 19 - Employ Technical Controls Flashcards

1
Q

What is the process of thoroughly and completely removing input of data from a storage medium so that file remnants cannot be recovered

A

Input Sanitization

It is the most common approach to mitigating the effects of code injections particularly XSS and SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name some common tactics for Input Sanitization

A

Escaping - encoding or substituting special characters in HTML markup with representations that are called entities

Sanitization - using libraries that automatically parse and strip the user-supplied HTML input of untrusted data

Null Byte Sanitization - most effective what to prevent poisoning

Parameterized Query - a technique that defends agains a SQL Injection by incorporating placeholders in a SQL Query

Allow List - white list of sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the concept of resolving a finding through changing how it is used or implemented

A

Process-Level Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of assigning a specific certificate to a particular element to avoid MitM attacks

A

Certificate Pinning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the platform that controls passwords, key pairs, and other sensitive information

A

Secret Management Solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the technique that is a dynamic code analysis that involves sending a running application random and unusual input so as to evaluate how the app responds

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some Operational Control Considerations

A

Job Rotation
Time of Day Restriction
Mandatory Vacations
User Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly