Chapter 1.6 Flashcards

1
Q

race condition

A

A race condition vulnerability is found where multiple threads are attempting to write at the same memory location. Race conditions have been used as an anti-virus evasion technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

integer overflow

A

An integer overflow attack causes the target software to calculate a value that exceeds the upper and lower bounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

buffer overflow

A

A buffer overflow is an application attack that exploits fixed data buffer sizes in a target piece of software by sending data that is too large for the buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

pointer dereference

A

Pointer dereference is a software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to (pointee). Dereferencing may crash the application and corrupt memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MEF

A

A mission essential function (MEF) is one that cannot be deferred. This means that the organization must be able to perform the function as close to continually as possible, and if there is any service disruption, the mission essential functions must be restored first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM

A

IAM is a security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

memory leak

A

Memory leaks in the OS kernel are extremely serious. A memory leak may itself be a sign of a malicious or corrupted process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DLL injection

A

DLL injection is not a vulnerability, but of the way the operating system allows one process to attach to another, and then force it to load a malicious link library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PIN

A

Cisco’s SAFE architecture is a good starting point for understanding the complex topic of network architecture design. The SAFE guidance refers to Places In the Network (PIN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

pinch point

A

A single point of failure (a “pinch point”), relies on a single hardware server or appliance or network channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly