Threats And Attacks On Endpoints Flashcards

1
Q

Zero-day Attack

A

Unknown vulnerability
New software
Impossible to detect
Hard to patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Default Configurations

A

Weak
Out-of-the-box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open permissions

A

Weak configuration
Everyone
777 on Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unsecured Root Accounts

A

Weak configuration
Weak password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weak Encryption

A

Weak configuration
Length of key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cross-site scripting (XSS)

A

Web application vulnerability
Malicious scripts on victims browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Same Origin Policy

A

Allowing execution of scripts that come from same domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reflected Cross Site Scripting

A

Most common XSS
Non-persistent XSS
Injects malicious scripts in any fields and accepts and sends to server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stored XSS

A

Persistent cross site scripting
Malicious script by attacker stored on web server or database
Might affect more than one user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DOM Based XSS

A

JavaScript failing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SQL Injection

A

Injecting special characters into apps input field
Resulting sensitive info gathered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Error Based SQL Injection

A

Confirms vulnerability by database error messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blind SQL Injection

A

Happens by making SQL query so database execution engine is made to answer yes or no questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Second Order SQL Injection

A

Malicious input stored in database table and used as an input parameter in a different SQL query in a different place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Race Condition

A

When app processes multiple operations at the same time causing failures in execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Path Manipulation

A

Upload malicious files into app