Section 6 Flashcards
Which type of intrusion detection system (IDS) is used to analyze activities on the network interface of a particular asset?
host based
Nmap
used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an operating system.
What is used to prevent buffer overflow?
bounds checking
Which type of vulnerability is present when multiple threads within a process control access to a particular resource?
race condition
- the correct handling depends on timing or transactions.
Which type of attack occurs when certain print functions within a programming language are used to manipulate and view the internal memory of an application?
format string
Which type of attack is an example of an input validation attack?
format string
When should updates be performed?
after testing and vetting
Which port service needs to be removed when running a webserver?
Port 53 is typically blocked on webservers to prevent Domain Name System (DNS) servers from divulging critical information to attackers.
Which action is considered a significant event that should be included in the logging process?
administrative privilege
Which buffer size creates an entry point for a cyberattack when the buffer reaches 8 bytes?
4 bytes
What is core impact?
a centralized penetration testing tool that enables security teams to conduct advanced, multi-phased penetration tests. It is a type of tool categorized as an exploit framework. Exploit frameworks include pre-packaged sets of exploits
Which symmetric encryption algorithm is the standard encryption algorithm used by the US Federal government?
AES
Which type of attack is a client-side attack?
click jacking
Burp Suite
a web assessment and analysis tool that looks for issues on websites such as cross-site scripting or SQL injection flaws.
Which type of analysis tool attacks applications with inputs from a wide variety of sources in the hope that the application will fail or perform in unexpected ways?
Fuzzer
- a tool that bombards applications with all manner of data and inputs from a wide variety of sources, in the hope that the application will fail or perform in unexpected ways.