CompTIA CySA+ CS0-003 Deck 9 Flashcards

Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.

1
Q

Output Encoding

A

Coding methods to sanitize output created from user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parameterized Queries

A

A technique that defends against SQL injection by incorporating placeholders in a SQL query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is SSDLC different from SDLC?

A

SSDLC formally requires security considerations to be included in each phase of development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When an attacker chooses predetermined passwords and tries them for multiple user accounts, this is known as:

A

Password Spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack is represented by the following?

%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc/config

A

URL encoded directory traversal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Buffer Overflow

A

An attack in which data goes past the boundary of the destination buffer and begins to corrupt adjacent memory. This can allow the attacker to crash the system or execute arbitrary code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Heap Overflow

A

A software vulnerability where input is allowed to overwrite memory locations within the area of a process’s memory allocation used to store dynamically sized variables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integer Overflow

A

An attack in which a computed result is too large to fit in its assigned storage space, which may lead to crashing or data corruption, and may trigger a buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(ASLR)

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(ASLR)

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(ASLR) Address Space Layout Randomization

A

A technique that randomizes where components in a running application are placed in memory to protect against buffer overflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL injection

A

An attack that injects a database query into the input data directed at a server by accessing the client side of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Directory Traversal

A

An application attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(XSS)

A

Cross-site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(XSS) Cross-site Scripting

A

A malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

File Inclusion

A

A web application vulnerability that allows an attacker either to download a file from an arbitrary location on the host file system or to upload an executable or script file to open a backdoor.

17
Q

Cookie

A

A text file used to store information about a user when they visit a website. Some sites use cookies to support user sessions.

18
Q

Session Hijacking

A

A type of spoofing attack where the attacker disconnects a host then replaces it with his or her own machine, spoofing the original host’s IP address.

19
Q

(XSRF)

A

Cross-Site Request Forgery

20
Q

(XSRF) Cross-Site Request Forgery

A

A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.

21
Q

(SSRF)

A

Server-Side Request Forgery

22
Q

(SSRF) Server-Side Request Forgery

A

An attack where an attacker takes advantage of the trust established between the server and the resources it can access, including itself.

23
Q

What type of attack is represented by the following?
SELECT * FROM tbl_user WHERE username = ‘’ or 1=1–’ AND password ‘x’

A

SQL injection

24
Q

This type of XSS attack inserts the malicious code into the web application, oftentimes by putting the script syntax into a comment field used by the web application, so that the script runs for all future visitors.

A

Stored XSS

25
Q

This type of attack describes a web application vulnerability that allows an attacker to send unauthorized requests from a vulnerable web application to other internal or external systems.

A

SSRF

26
Q

This critical security measure is not available for end-of-life applications.

A

Security patching

27
Q

Implementing key management practices is associated with this control.

A

Encryption

28
Q

What is HTTP?

A

The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, and is used to load webpages using hypertext links. HTTP is an application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack. A typical flow over HTTP involves a client machine making a request to a server, which then sends a response message.

29
Q

What is in an HTTP request?

A

1.) HTTP version type
2.) a URL
3.) an HTTP method
4.) HTTP request headers
5.) Optional HTTP body.

30
Q

What are HTTP request headers?

A

HTTP headers contain text information stored in key-value pairs, and they are included in every HTTP request (and response, more on that later).

31
Q

What’s are the HTTP status code?

A

1xx Informational
2xx Success
3xx Redirection
4xx Client Error
5xx Server Error

32
Q

Can DDoS attacks be launched over HTTP?

A

Keep in mind that HTTP is a “stateless” protocol, which means that each command runs independent of any other command. In the original spec, HTTP requests each created and closed a TCP connection. In newer versions of the HTTP protocol (HTTP 1.1 and above), persistent connection allows for multiple HTTP requests to pass over a persistent TCP connection, improving resource consumption. In the context of DoS or DDoS attacks, HTTP requests in large quantities can be used to mount an attack on a target device, and are considered part of application layer attacks or layer 7 attacks.

33
Q

What is TLS?

A

Transport Layer Security.

34
Q

What is Transport Layer Security (TLS)?

A

Transport Layer Security, or TLS, is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website. TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VoIP). In this article we will focus on the role of TLS in web application security.

35
Q

What is SSL?

A

Secure Sockets Layer

36
Q

What is Secure Sockets Layer?

A

SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications. SSL is the predecessor to the modern TLS encryption used today.

A website that implements SSL/TLS has “HTTPS” in its URL instead of “HTTP.”