Security Module 3 Flashcards

1
Q

Which vulnerability does an attacker exploit in order to successfully harm a system via command injection?

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following cookies is stored in RAM and deleted when the browser is closed?

A

Session cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a heap spray differ from a buffer overflow attack?

A

A heap spray targets only specific parts of memory whereas a buffer overflow inputs more data into memory than a system is capable of governing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a website accepts user input and doesn’t validate the input, this website may be susceptible to which of the following?

A

Cross-Site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of DDoS attack?

A

To prevent users from accessing a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network, client, operating system, data and application are all examples of which of the following?

A

Attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A DoS attack can use which protocol to conduct an attack?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How would a website track a user’s purchasing history and advertise to the user based on these results?

A

Through the use of a third-party cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A SYN flood attack targets a vulnerability of which of the following?

A

Three-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why would an attacker conduct a passive man-in-the-middle attack as opposed to an active man-in-the-middle

A

A passive man-in-the-middle attack can exploit the copied data at a later date making it harder to trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If an attacker modifies a referrer filed to portray that request came from a legitimate site this is known as what?

A

Header manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP poisoning can assist which other attack method?

A

Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why would an attacker steal a session token from a user?

A

To impersonate the user via session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is a zone transfer DNS poisoning generally more worthwhile for an attacker than altering a host table?

A

A zone transfer will affect many DNS servers as opposed to just a single host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a simple way to verify if a webpage is NOT capable of SQL injection?

A

If user input is correctly filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can integer overflow attacks and buffer overflow attacks work together?

A

An integer overflow is imported during the buffer length calculation which could result in a buffer overflow attack

17
Q

Why is vertical privilege escalation generally simpler than horizontal privilege escalation?

A

Vertical privilege escalation only requires access to one account as opposed to more than one

18
Q

Why do zero-day attacks remain a serious threat to organizations?

A

Updated anti-virus software can’t detect them by comparing virus signatures

19
Q

Java, Adobe Flash, and Adobe Acrobat Reader are all examples of what?

A

Plug-ins

20
Q

Which type of attack can compromise a system just by a user viewing a web page?

A

A zero-pixel IFrame