3 Flashcards

1
Q

A situation where a cryptographic hash function produces two different digests for the same data input is referred to as a hash collision.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of cryptographic attack that forces a network protocol to revert to its older, less secure version is known as:

A

Downgrade attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following facilitate(s) privilege escalation attacks? (Select all that apply)

A
  • System/application vulnerability

*Social engineering techniques

  • System/application misconfiguration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers can be used to describe characteristics of a cross-site scripting attack?

A
  • Exploits the trust a user’s web browser has in a website
  • A malicious script is injected into a trusted website
  • User’s browser executes attacker’s script
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following indicates an SQL injection attack attempt?

A

SELECT * FROM users WHERE userName = ‘Alice’ AND password = ‘’ OR ‘1’ = ‘1’;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources is known as:

A

** DLL **

A DLL is a library that contains code and data that can be used by more than one program at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following describes an application attack that relies on executing a library of code?

A

DLL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following fragments of input might indicate an LDAP injection attack attempt? (Select 2 answers)

A
  • administrator)(&))
  • search.aspx?name=userName)(zone=*)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following fragments of input might indicate an XML injection attack attempt?

A

… p@$$w0rd</password></user><user><name>attacker</name> ....</user>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following terms describes an attempt to read a variable value from an invalid memory address?

A

Null-pointer dereference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A dot-dot-slash attack is also referred to as:

A

Directory traversal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following URLs is a potential indicator of a directory traversal attack?

A
  • http://www.example.com/var/../etc/passwd
  • http://www.example.com/var/www/../../etc/passwd
  • http://www.example.com/var/www/files/../../../etc/passwd
  • http://www.example.com/var/www/files/images/../../../../etc/passwdAny of the above
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is called:

A

** Buffer overflow **

Also known as a buffer overrun, buffer overflow occurs when the amount of data in the buffer exceeds its storage capacity. That extra data overflows into adjacent memory locations and corrupts or overwrites the data in those locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A situation in which an application writes to an area of memory it is not supposed to have access to is referred to as:

A

** Buffer overflow **

Also known as a buffer overrun, buffer overflow occurs when the amount of data in the buffer exceeds its storage capacity. That extra data overflows into adjacent memory locations and corrupts or overwrites the data in those locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A malfunction in a preprogrammed sequential access to a shared resource is described as:

A

** Race condition **

A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following terms refers to a vulnerability caused by race conditions?

A
  • Time-of-check to time-of-use *

Time-of-check-to-time-of-use (TOCTTOU - pronounced TOCK-too) is a file-based race condition that occurs when a resource is checked for a particular value, such as whether a file exists or not, and that value then changes before the resource is used, invalidating the results of the check.

17
Q

Which of the programming aspects listed below are critical in secure application development process? (Select 2 answers)

A
  • Input validation
  • Error and exception handling
18
Q

A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:

A

Improper input validation

19
Q

Which of the following answers refers to a countermeasure against code injection?

A

Input validation

20
Q

A network replay attack occurs when an attacker intercepts sensitive user data and resends it to the receiver with the intent of gaining unauthorized access or tricking the receiver into unauthorized operations.

A

True

21
Q

Which of the following are the characteristic features of a session ID? (Select 3 answers)

A
  • A unique identifier assigned by the website to a specific user
  • A piece of data that can be stored in a cookie, or embedded as an URL parameter
  • Stored in a visitor’s browser
22
Q

In a session replay attack, an attacker steals a valid session ID of a user and resends it to the server with the intent of gaining unauthorized access or tricking the server into unauthorized operations.

A

True

23
Q

Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?

A

** Integer overflow **

An integer overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold

24
Q

Which type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions?

A

** SSRF **

Server-side request forgery (also known as SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location.

25
Q

Which of the following answers can be used to describe characteristics of a cross-site request forgery attack? (Select 3 answers)

A
  • Exploits the trust a website has in the user’s web browser
  • A user is tricked by an attacker into submitting unauthorized web requests
  • Website executes attacker’s requests