ch7 Flashcards

(9 cards)

1
Q

Type of application vulnerability, taht sees a secret inseration of malicious code ino a program memory space allowing attackers to exploit vulnerability

A

Memory Inkection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of application attack which happnes when excessive data overflows a programs buffers, causing choas

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This type of vulnerabilitiy is when two memroy threads attempt to access the same information at the same time.

A

Race Condition or TOC/TOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability where updates can delivery malicious code to a program

A

Malicious update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Web based vulnerability when at attacker exploits vulnerability in a website or an applications input field to manipulate SQL queries

A

SQLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQLI steps

A

User Input fields, malicous input, query manipulation, data expouser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two ways to mitigate a SQLI vulnerabilty

A

Stored procedure and input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of hardware vulnerabilities

A

Vulnerability in firmware, End of LIfe Systems, Legacysystems vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly