Week 4 Flashcards

1
Q

a ____ provides services to clients

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On the Internet, a ____ provides services that are implemented as web applications

A

web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An important characteristic of server-side web applications is that ____ based on inputs from the user

A

they create dynamic content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Securing ____ is often considered more difficult than protecting other systems

A

server-side web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Such common web application attacks are

A
  • cross-site scripting
  • SQL injection
  • XML injection
  • command injection/directory traversal.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ injects scripts into a web application server to direct attacks at unsuspecting clients

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A server-side web application attack that manipulates user responses is____

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is an injection attack technique used to manipulate or compromise the logic of an XML application or document

A

XML Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory other than the server’s root directory

A

Directory Traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ attacks target vulnerabilities in client applications that interact with a compromised server or process malicious data

A

Client-Side Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attacker can modify the HTTP headers to create an attack using ____

A

HTTP header manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of HTTP header attacks include

A
  • Referer
  • Accept-Language
  • Response splitting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Response splitting
Instead of the web server asking the user for the same information each time the site is visited, the server can store user-specific information in a file on the user’s local computer and then retrieve it later. This file is called a ____

A

cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____ is created from the website that a user is currently viewing

A

first-party cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These cookies are called ____ because they are created by a third party (such as DoubleClick) that is different from the primary site.

A

third-party cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is stored in random access memory (RAM), instead of on the hard drive, and lasts only for the duration of the visit to the website

A

session cookie

17
Q

A ____ is opposite of session cookie and is recorded on the hard drive of the computer and does not expire when the browser closes

A

persistent cookie

18
Q

A locally shared object (LSO) is also called a ____ , named after the Adobe Flash player.

A

Flash cookie

19
Q

____ are files that are coupled to email messages. Malicious attachments are commonly used to spread viruses, Trojans, and other malware when they are opened.

A

Attachments

20
Q

____ is an attack in which an attacker attempts to impersonate the user by using her session token.

A

Session hijacking

21
Q

A____ attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

A

buffer overflow attack

22
Q

In an ____ attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an ____overflow.

A

integer overflow

23
Q

an ____ attack allows an attacker to run programs and execute commands on a different computer.

A

arbitrary/remote code execution