other FT questions Flashcards
What is used in URL Phishing?
Prepending
True or False: A situation where a cryptographic hash function produces two different digests for the same data input is referred to as a hash collision.
False
SELECT * FROM users WHERE userName = ‘Alice’ AND password = ‘’ OR ‘1’ = ‘1’; is an example of what type of attack?
SQL injection attack
A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources.
DLL
A situation in which an application writes to an area of memory it is not supposed to have access to.
Buffer Overflow
A malfunction in a preprogrammed sequential access to a shared resource.
Race Condition
Type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions.
SSRF
A penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works.
White-box testing
True or False: In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting.
False
True or False: In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system.
False
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War Driving
True or False: In cybersecurity exercises, purple team combines the roles of all other teams (i.e. red, blue, and white).
False
What state of digital data requires data to be processed in an unencrypted form?
In processing.
A duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data.
Hot site.
A disaster recovery facility that provides only the physical space for recovery operations.
Cold site
A cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software
IaaS (Infrastructure as a Service)
A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems.
RTOS
An integrated circuit combining components normally found in a standard computer system.
SoC
T or F: One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code has not been tampered with since it was signed. The authenticity and integrity of the application’s code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).
True
A type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks.
Salt
The best solution for a company that needs IT services but lacks any IT personnel?
MSP
A third-party vendor offering IT security management services?
MSSP
T or F: The term “Fog computing” refers to a local network infrastructure between IoT devices and the cloud designed to speed up data transmission and processing.
True
The concept of virtualization on an application level.
Containerization.
Usage audit and Asset documentation are security measures can be used to prevent:
VM Sprawl
T or F: Code obfuscation techniques rely on encryption to protect the source code against unauthorized access.
False
A collection of commonly used programming functions designed to speed up software development process is known as:
Library
Refers to a specialized suite of software tools used for developing applications for a specific platform.
SDK
A nonprofit organization focused on software security.
OWASP
A security feature used in Bluetooth device pairing.
PIN code