Phase 3 Flashcards

1
Q

What does CMMI stand for?

A

Capability Maturity Model Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many levels are there in CMMI?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At which level of CMMI are processes characterized throughout the organization?

Defined

Optimizing

Managed

Quantitatively Managed

A

Defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PCI-DSS has how many objectives?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At which level of CMMI are processes unpredictable and/or poorly controlled?

A

Initial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are the significant compliance drivers used to manage a GRC program effectively? (select all that apply)

Regulatory

Compliance

Contractual

Organizational

A

Regulatory

Contractual

Organizational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the default port used by burp suite for the proxy

A

8080

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using burp suite as a proxy, what default IP address should be pointed to for the proxy

A

Localhost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What additional steps are necessary to be able to access an https site using a proxy

A

The proxy’s TLS root CA certificate must be installed in the browser’s CA store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which section of an html document would the <title></title> tags normally be used

A

<head> section
</head>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is the anchor tag?

<ing>
<div>
<anchor>
<a>
</a></anchor></div></ing>

A

<a></a>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is inline content

A

When all html and other elements exist in one single page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is linked content

A

When one page has html with references to separate files containing css and Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of vulnerability allows attackers to execute unauthorized commands on the server by exploiting improperly sanitized input fields?

A

Command Injection .
Is a vulnerability that allows an attacker to execute arbitrary commands on a host operating system through a vulnerable app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Attack uses the users currently authenticate session to forge a request to a web application ?

A

Cross site request forgery (csrf) tricks the victim into submitting a malicious request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What vulnerability occurs when a web application allows the upload of executable scripts as files?

A

File inclusion lfi. And upload vulnerability

These vulnerabilities allow attackers to include files on the server or upload dangerous files to a server

LFI local file inclusion
Rfi remote file inclusion

17
Q

What vulnerability is present if an attacker can programmatically bypass a web application captcha

A

Using an insecure captcha occur when captcha implementation is weak allowing automated systems to attack

18
Q

Which vulnerability allows attackers to manipulate backend databases through unsanitized input fields

A

SQL injection involves inserting a SQL query via the input data from the client to the application

19
Q

What vulnerability could allow an attacker to predict or brute force a session token

A

Weak session ids are vulnerable to interception or prediction, allowing attackers to hijack a users session

20
Q

What type of vulnerability allows attackers to inject client-side scripts into web pages viewed by other users

A

Cross-site scripting(xss) allows attackers to inject malicious scripts into content viewed by other users. Stored xss persists on the server, while reflected xss is returned in the response

21
Q

What are the 6 levels of the software development cycle

A

Planning
Analysis
Design
Implementation
Testing and integration
Maintenance

22
Q

Where is the default Apache configuration file in fedora linux?

A

/etc/httpd/conf

23
Q

Why should the 404 page be customized

A

Obfuscate the details about apache server, to minimize known attacks

24
Q

What is java

A

A compiled, statically typed language that is used to develop a wide variety of applications, including desktop software, mobile apps and web servers

25
Q

What is javascript

A

Interpreted dynamically typed language primarily used to add interactivity to web pages

26
Q

What is Metadata?

A

Data about the data or object

27
Q

What designates Javascript in an html document?

A
28
Q

What is Race condition?

A

An attack method where attacker races against a vulnerable application by exploiting the gap between testing and accessing the file. Also known as TOCTOU

29
Q

How many directories deep does mkdir -p $(python3 -c ‘print (“A/”*50)’) create?

A

50

30
Q

In the command mkdir -p $(python3 -c ‘print(“A/”*50)’) what does the -p do?

A

Creates parent directories, as needed

31
Q

Which SQL command allows us to query a database for current values?

A

SELECT

32
Q

Which SQL command returns all the values in a table named people?

A

SELECT * FROM people;

33
Q

Which SQL command allows new records to be created in a table called people?

A

INSERT INTO people (username,firstname,lastname,pass) VALUES(“uname”,”some”,”one”,”password1!);

34
Q

Where does PHP scripting run?

A

Server side

35
Q

Why would a programmer choose a compiled language instead of an interpreted one?

A

Compiled code tends to be faster and more efficient

36
Q

Using xdd on a file, you get the following output. What type of file is this?
00000000: 2321 2f62 686e 2f62 6173 680a

A

Bash script

37
Q

What does -m32 flag do with gcc?

A

Compiles code into 32bit binary