quiz 2 Flashcards

1
Q

Denial-of-service (DoS) attack

A

an attack against a network resource that aims to prevent, disrupt, or delay authorized users from accessing the network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Distributed Denial-of-Service (DDoS) attack

A

a DoS attack that is simultaneously launched from multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network-based DDoS attack

A

a DDoS attack that aims to exhaust the target system’s network bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protocol-based DDoS attack

A

a DDoS attack that aims to exhaust the target system’s network resources or the resources of a network infrastructure equipment, such as a firewall or a load balancer. Exploits the weaknesses of network layer (OSI layer 3) and transport layer (OSI layer 4) protocols to create maliciously configured protocol packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application layer DDoS attack

A

a DDoS attack that aims to exhaust specific functions or features of a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Domain name system (DNS)

A

a hierarchical and decentralized naming system for identifying and locating the resources connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS resolution

A

process of translating or resolving a domain name to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS zone

A

a portion of a DNS namespace that is managed by an administrator or specific organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authoritative name server

A

a DNS server that manages a domain’s configuration, also known as the domain’s DNS record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain reputation

A

a measure of a domain’s trustworthiness based on historical data on the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Domain hijacking

A

the act of changing the registration information of a domain without the knowledge or consent of the domain owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

URL redirection

A

the act of using a URL to divert a user to a malicious website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS poisoning

A

an attack that aims to redirect a user to a malicious website by modifying the user’s DNS query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data origin authentication

A

A DNS client is assured that DNS data originated from the zone owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Name System Security Extensions

A

a set of extensions to DNS that provide a DNS resolver cryptographic authentication of DNS data using digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data integrity

A

A DNS client is assured that DNS data has not been modified in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data link layer

A

facilitates data transfer between two connected devices on the same network. responsible for flow control and the detection and correction of errors that may occur in the physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

media access control (MAC) address

A

a unique 48-bit identifier assigned to a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

address resolution protocol (ARP)

A

a protocol used for resolving an internet address (Layer 3) into a MAC address (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ARP cache table

A

a table that maps an internet address to the internet address’ corresponding MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Address resolution protocol (ARP) poisoning

A

an attack in which an attacker sends spoofed ARP messages on a local area network (LAN) to associate the attacker’s MAC address with the IP address of a target host on the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Media access control (MAC) flooding

A

an attack in which a large number of invalid MAC addresses are sent to a network switch with the aim of overwriting the switch’s MAC table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC cloning

A

the act of changing the factory-assigned MAC address of a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Man-In-The-Middle (MITM) attack

A

an attack in which an attacker eavesdrops or modifies the communications between two parties. operates at the network layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
MAC table
a table that maps each network device's MAC address to a physical port on a switch
24
Unicast flooding
a switch's broadcast of a packet on all the switch's ports. Unicast flooding enables an attacker to gain access to all data packets on a LAN.
25
secure channel
a communication channel that guarantees data authenticity and data confidentiality.
26
Man-In-The-Browser (MITB) attack
a type of MITM attack that uses malware to intercept or modify messages exchanged between a web browser and a web server.most often used to steal financial information by modifying a user's communications with an Internet banking website.
27
POPS
uses SSL/TLS to secure communications between a POP client and a POP server.
27
Post office protocol (POP)
an Internet standard protocol used by an email client to retrieve an email from a mail server. does not support the sending of an email
28
Internet message access protocol (IMAP)
an Internet standard protocol used by an email client to retrieve an email from a mail server.
29
IMAPS
uses SSL/TLS to secure communications between an IMAP client and an IMAP server.
30
Multipurpose Internet Mail Extensions (MIME)
an Internet standard that extends the format of an email message to support non-ASCII character sets and multimedia attachments
31
Secure/Multipurpose Internet Mail Extensions (S/MIME)
an Internet standard for signing and encrypting MIME data.
32
Secure shell protocol (SSH)
a cryptographic network protocol for securely operating a network service over an insecure network.
33
Protocol tunneling
the encapsulation of a protocol's packets within the packets of another protocol.
34
FTPS
an extension to the file transfer protocol (FTP) that uses SSL/TLS to provide communication security.
35
SSH file transfer protocol (SFTP)
an extension of the SSH protocol that enables secure file transfer capabilities between networked hosts
36
Secure real-time transport protocol (SRTP)
a protocol for secure delivery of voice and video services over an IP network.
37
Lightweight directory access protocol (LDAP)
a protocol for accessing and maintaining distributed directory information services over an IP network
38
LDAPS
uses SSL/TLS to protect LDAP transmissions
39
LDAP injection attack
an attack in which an attacker exploits input validation vulnerabilities to construct and execute an unauthorized LDAP query
40
Hypertext transfer protocol secure (HTTPS)
an extension of the hypertext transfer protocol (HTTP) that uses SSL/TLS to establish an authenticated and encrypted connection between a client and a server.
41
Internet Protocol Security (IPSec)
a protocol suite for securing data communications over an IP network.
42
Authentication Header (AH)
an IPSec protocol that provides authentication and integrity for an IP packet and protection against a replay attack
43
Encapsulating Security Protocol (ESP)
an IPSec protocol that provides authentication, integrity, and confidentiality for an IP packet and protection against a replay attack
44
Transport mode
an IPSec mode in which only an IP payload is authenticated and encrypted, not the IP header.
45
Tunnel mode
an IPSec mode in which an IP packet (IP header and IP payload) is authenticated, encrypted, and encapsulated in a tunneling protocol
46
Network segmentation
the act of partitioning a network into segments. Network segmentation is used to create security zones
47
security zone
a network segment that has specific security requirements.
48
trusted zone
a security zone that contains protected network resources that should only be accessible by an authorized user or system.
48
untrusted zone
a security zone that is outside an organization's control
48
virtual local area network (VLAN)
a broadcast domain that is segmented at the data link layer.
49
jump server
a minimally configured server in a security zone that is used for managing the hosts in the security zone
49
demilitarized zone
a security zone that lies between a trusted and an untrusted zone.
50
Port-based VLAN
a VLAN in which a host is connected to a specific switch port that is assigned to a VLAN
51
Protocol-based VLAN
a VLAN in which protocol types are used to assign a host to a VLAN
52
MAC-based VLAN
a VLAN in which a host's MAC address is used to assign the host to a VLAN.
53
firewall
a network device or a software program that controls inbound and outbound traffic based on a set of rules
54
hardware firewall
a firewall that is implemented in a physical device
55
software firewall
a firewall that is implemented in software and runs on a general-purpose computer
56
open-source firewall
software firewall with freely available source code that can be modified and redistributed
57
proprietary firewall
a firewall that is built by an entity that has exclusive rights to the firewall
58
stateless firewall
a firewall that allows or blocks a packet based on the information in the packet header
59
access control list (ACL)
a list of rules used by a firewall to control inbound and outbound network traffic
60
stateful firewall
a firewall that monitors and tracks active network connection sessions and blocks a packet that does not belong to an active session
61
unified threat management (UTM)
a security appliance that provides multiple security functions at a single point on a network
62
next-generation firewall (NGFW)
a firewall that combines the functionality of a packet filtering firewall with other technologies to detect and block a network attack
63
virtual firewall
a software or hardware firewall that provides packet filtering within a virtualized environment
64
Hypervisor mode
a virtual firewall mode in which a firewall resides in a host's hypervisor kernel and monitors and controls inbound/outbound traffic on the virtual machines running on the host.
65
Bridge mode
a virtual firewall mode in which a firewall runs on a virtual machine and monitors and controls inbound/outbound traffic on the virtual machine.
66
host-based firewall
a software firewall that runs on a host and controls the host's inbound and outbound network traffic
67
network address translation (NAT) gateway
a device that enables multiple hosts with private IP addresses to connect to the Internet using a single public IP address.
67
web application firewall (WAF)
a specific form of application firewall that monitors and filters HTTP and HTTPS traffic between a web application and the Internet
68
application firewall
a firewall that controls an application's input and output.
69
URL filtering
he act of blocking access to a URL
70
intrusion detection system (IDS)
a device or a software application that detects a malicious activity or a security policy violation in a system
71
Content filtering
the act of blocking access to content based on predefined criteria.
72
Network Intrusion Detection System (NIDS)
an IDS that detects a threat to a network.
73
Network Intrusion Prevention system (NIPS)
a NIDS that blocks a threat to a network.
73
host-based intrusion detection system (HIDS)
an IDS that detects a threat to a host
74
Inline mode
a NIDS/NIPS deployment mode in which network traffic is passed through a NIDS/NIPS
75
Passive mode
a NIDS/NIPS deployment mode in which a NIDS/NIPS receives a copy of network traffic.
76
Signature-based detection
a detection method that detects an attack by using the attack's pattern
77
Anomaly-based detection
a detection method that detects an attack by identifying a network state that is different from the network's normal state
78
Behavior-based detection
a detection method that detects an attack by searching for a specific pattern that matches a threat behavior
79
Heuristic-based detection
a detection method that detects an attack by adaptive techniques
80
virtual private network (VPN)
a service using encryption to connect devices over a public network
81
site-to-site VPN
a connection between two or more networks
82
client-to-site VPN
a connection between a client computer and a remote router.
83
Transport Layer Security (TLS)
Communication on HTTPS is encrypted through the use of
83
full tunnel
routes and encrypts all network traffic through the VPN, regardless of where the VPN service is hosted
84
split tunnel
routes and encrypts all non-internet network traffic over the VPN
85
HTTPS (Hypertext Transfer Protocol Secure)
Security on the web is provided through the use of
86
Secure Sockets Layer
In the past, communication was encrypted through the use of the
87
Layer 2 Tunneling Protocol (L2TP
a mechanism for setting up VPN tunnels at the data link layer.
87
broadcast storm
the occurrence of a large number of broadcast and multicast packets on a network within a short time period.
88
bridge protocol data unit (BPDU)
a packet exchanged between switches on a local area network (LAN) to detect the network's loops
88
bridge protocol data unit (BPDU) guard
a control mechanism for preventing a BPDU packet from entering a switch port.
88
Broadcast storm prevention
the act of preventing or reducing packet rebroadcasts on a LAN.
89
network loop
a network topology in which more than one path exists between two network endpoints
90
Dynamic host configuration protocol (DHCP)
a network management protocol used for automating the assignment of IP addresses and network configuration parameters to devices on an IP network.
91
Dynamic host configuration protocol (DHCP) snooping
a Layer 2 control for preventing an unauthorized or rogue DHCP server from offering network configuration parameters to a DHCP client
92
DHCP spoofing attack
an attack in which an attacker configures a rogue DHCP server to send a forged DHCP response to a DHCP request.
93
DHCP starvation attack
an attack that aims to deplete a DHCP server's IP address pool
94
load balancer
a hardware device or a software program that performs load balancing
95
Load balancing
the act of distributing network or application traffic across multiple servers in a server group
96
Active/active
a load balancer mode in which two load balancers share the workload and distribute traffic across multiple servers.
97
Active/passive
a load balancer mode in which a primary load balancer distributes traffic across multiple servers and a standby load balancer that is activated when the primary load balancer fails.
98
Least connection load balancing
a scheduling algorithm in which data traffic is distributed to a server with the fewest number of active connections.
99
IP hash load balancing
a scheduling algorithm in which data traffic is routed to a specific server based on a client's IP address.
99
Least response time load balancing
a scheduling algorithm in which data traffic is distributed to a server with the fewest number of active connections and the lowest average response time
100
Round robin load balancing
a scheduling algorithm in which data traffic is distributed across a group of servers sequentially.
101
East-west traffic
the traffic between a data center's network components.
102
North-south traffic
the traffic that enters or leaves a data center
103
Southbound traffic
the traffic that enters a data center
104
Northbound traffic
the traffic that leaves a data center.
105
intranet
a private network that can only be accessed by an organization's authorized internal users
106
extranet
a controlled private network that allows access to a subset of an organization's intranet to the organization's external partners, vendors, suppliers, and customers
107
Cross-site scripting
a web server security vulnerability that enables the injection of client-side scripts into a web server's web pages.
108
reflected cross-site scripting
a cross-site scripting attack in which an injected script is returned to a client in response to an HTTP request by the client.
109
Document object model (DOM)
a standard object model and programming interface for HTML. DOM defines how to get, change, add, or delete HTML elements.
109
stored cross-site scripting
a cross-site scripting attack in which a malicious script is stored on a web server's back-end database and returned to all clients that request the web pages containing the script
110
DOM-based cross-site scripting
a cross-site scripting attack in which the source and destination of the attack is the client web browser
111
cross-site request forgery (CSRF)
an attack in which an attacker sends a forged request to a web application on behalf of an authenticated user.
112
server-side request forgery (SSRF)
an attack in which an attacker sends forged requests from a web application's server to other servers. In an SSRF attack, an attacker tricks a server into making an unauthorized request.
113
data buffer
a memory region used for temporarily storing data while the data is being transferred from one memory location to another
114
buffer overflow
a programming error condition that occurs when the size of the data to be stored in a buffer is larger than the buffer size.
115
Improper input handling
a program's insufficient validity checking of user input
116
data type
a data attribute that specifies how the data is intended to be used in a program
117
integer overflow
a programming error condition that occurs when the result of an integer operation is greater than the maximum size, or less than the minimum size of the integer type used to store the result.
118
Memory management
the process of controlling and coordinating a computer's memory
119
Stack
memory that stores local variables and is used for static memory allocation
120
Heap
memory that stores global variables and is used for dynamic memory allocation
121
memory leak
an occurrence in which a program allocates heap memory but does not deallocate the memory when the memory is no longer needed
122
pointer
a program variable that stores a memory address.
123
pointer dereferencing
the act of obtaining the value stored at the memory location pointed to by the pointer.
124
Error handling
the process of responding and recovering from error conditions in a program
125
replay attack
a network attack in which a data transmission is intercepted and maliciously repeated or delayed.
126
session ID
a unique number assigned to an authenticated user by a web application
127
session replay attack
a replay attack in which a user's session ID is used to impersonate the user and perform a fraudulent transaction or activity.
128
New technology LAN manager (NTLM)
a challenge-response authentication protocol.
129
Pass the hash
an attack in which an attacker authenticates to a server or service using the NTLM's password hash of a user.
130
SQL injection
an injection attack in which an application's user input fields are used to insert a malicious SQL statement into the application.
130
injection attack
an attack that injects or inserts malicious input into a program or database query.
131
Extensible Markup Language (XML)
a markup language that defines a set of rules for encoding documents in a text-based format.
132
XML injection
an attack that manipulates the logic of an XML-based application
133
dynamic link library
a library of code and data for commonly used functions in a Windows computer.
134
DLL injection
an injection attack in which a process is forced to load and execute malicious DLL code within the process's address space
135
Lightweight directory access protocol (LDAP)
a protocol for accessing and maintaining distributed directory information services over an IP network.
135
LDAP injection
an attack in which an attacker exploits input validation vulnerabilities to manipulate an LDAP statement executed on an LDAP server
136
race condition
a software event in which multiple concurrently executing processes access a shared resource at the same time
137
Time-of-check (TOC)
the time at which a process checks a shared resource's state
137
Time-of-check to time-of-use
a class of software errors that are caused by a race condition.
138
Time-of-use (TOU)
the time at which a process uses a shared resource.
139
resource exhaustion attack
an attack that aims to slow down or disable an application by using up the application's limited resources
140
driver shim
a software library that intercepts and modifies calls to a device driver
141
device driver
a program that controls a computer-connected hardware device.
142
shim attack
an attack in which malicious code is added to a driver shim
143
Refactoring
a set of techniques used for improving a program's internal structure without changing the program's behavior.
144
refactoring attack
an attack in which malicious code is added to a device driver through refactoring without changing the device driver's desired behavior.
145
vertical privilege escalation
privilege escalation in which a lower privilege user or application gains privileges assigned to another user or application with higher privileges
145
Privilege escalation
the act of gaining account privileges beyond those assigned to the account.
145
horizontal privilege escalation
privilege escalation in which a user or application gains privileges assigned to another user or application with the same privileges.
146
root directory
a directory on a web server's file system that the web server's users can access
147
Directory traversal
a web application security vulnerability that allows unauthorized users to access files outside of a web server's root directory
148
system disk
any media that contains part or all of an operating system.
149
application programming interface (API)
a set of functions and protocols for building and integrating different applications and data sets.
150
application programming interface (API) attack
an attack that exploits the vulnerabilities in an application's API to attack the application or a service
151
development environment
the environment where an application is created, debugged, modified, and improved
151
Secure socket layer stripping (SSL stripping)
an attack that aims to downgrade an attempted HTTPS connection between a web server and client to an HTTP connection
152
environment
the collection of hardware and software used to build an application
153
test environment
the environment where an application is tested against the application's specification requirements.
154
staging environment
a pre-production environment that mirrors a production environment and contains the final release version of an application
155
Quality assurance
the process of testing an application's various aspects, including an application's stability, usability, security, functionality, and performance to ensure that the application meets user requirements
156
production environment
an environment where the release version of an application is deployed and made available to the application's users.
157
Code signing
the act of digitally signing software by the software's publisher.
158
Provisioning
the process of moving an application to a production environment and customizing the application configurations.
159
Deprovisioning
the process of removing an application from a production environment.
160
software development kit (SDK)
a collection of software development tools in one package
160
Software versioning
the process of assigning names or numbers to unique states of released software.
161
Secure coding
the practice of developing software in a way that minimizes the risk of creating software vulnerabilities
161
Secure coding techniques
methods designed to improve code security.
161
Version control
the practice of tracking and managing a software's versions.
161
Dead code
code that can never be executed at run-time, or is executed but whose result is never used in any other computation.
161
third-party library
a reusable software component developed by an entity other than the original publisher of a software development platform
162
Obfuscation
a secure coding technique that makes code difficult to read and harder to understand by modifying the code appearance.
162
Code reuse
the use of existing software to build new software
163
Elasticity
the degree to which a system is able to adapt to workload changes by automatically provisioning and deprovisioning resources.
164
Scalability
the measure of a system's ability to handle increased demands.
165
Horizontal scalability
scalability which entails adding new systems to an existing infrastructure
166
Vertical scalability
scalability which entails adding resources to existing systems
167
Software diversity
the practice of creating diversity within the software development process with the aim of reducing the extent of software vulnerability exploits
168
Data Exposure
the intentional or unintentional disclosure of information to an unauthorized user or application
169
Database normalization
the process of organizing data in a relational database
170
stored procedure
a group of SQL statements created to perform a specific task.
171
Salting
the process of adding a unique string of characters to a password before hashing the password
171
token vault
a secure storage mechanism that stores a mapping between sensitive data and tokens
171
Hashing
the process of transforming a variable length string to a fixed-size value
172
parameterized query
a query in which placeholders are used for parameters and the parameter values are supplied at execution time
173
Tokenization
the process of substituting a sensitive data element with a non-sensitive data element
173
code review
the process of systematically examining code with the aim of improving code quality.
173
Dynamic code analysis
a code review method that examines code during the code execution.
173
Static code analysis
a code review method that examines code without executing the code
174
Manual code review
the process of performing static code analysis by one or more code reviewers.
175
Fuzzing
an automated software testing technique for finding software bugs and vulnerabilities by feeding invalid and random data into software.
175
Development operations
a set of practices and tools that automate and integrate software development and IT operations.
176
fuzzer
a program that automatically generates random data for software testing.
177
Continuous integration
the practice of frequently merging new and modified code from multiple developers into a single software project.
178
Continuous delivery
the practice of frequently releasing new software that is ready to be deployed into a stage environment.
179
Continuous deployment
the practice of frequently deploying new software into a production environment.
180
Continuous validation
the practice of frequently verifying that new and existing software is tested.
181
Continuous monitoring
the practice of frequently monitoring released software to detect errors, security risks and compliance issues.
182
open web application security project (OWASP)
a non-profit foundation that publishes methodologies, documentation, tools, and technologies for raising awareness and improving web application security.
183
Web application security
the set of practices and technologies that enable the creation of secure web applications.
184
Input validation
a secure coding technique that ensures only valid input is entered into software.
185
OWASP Top 10
a regularly-updated list of the 10 most common web application security risks.
186
Allow list
an input validation method that ensures an input matches a set of known good values.
187
Block list
an input validation method that ensures an input does not contain known bad values.
188
Server-side validation
input validation that is performed by a server after input has been sent to the server.
189
Client-side validation
input validation that is performed by a client before input is sent to a server
190
191
192