Chapter 3 Flashcards

(49 cards)

1
Q

Acronym for API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DOM

A

Document Object Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LDAP

A

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RPC

A

Remote Procedure Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAM

A

Windows Security Account Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TOC/TOU

A

Time of Check / Time of Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

XML

A

Extensible Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XSRF

A

Cross Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XSS

A

Cross Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most Cyber attacks begin at a ___ level associated with an ordinary user

A

Ordinary User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Problem with weak validation?

A

1 cause behind most overflows, injection attacks and canonical structure errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Resource Exhaustion?

A

A state where a system doesn’t have the resources it needs to continue to function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why did Microsoft reduce the number of processes and services that run in elevated mode in its operating systems?

A

Blocking privilege escalation is an important defensive step in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a memory leak?

A

When a program doesn’t dump it’s unused memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Another name for input validation?

A

Input Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are stored procedures?

A

Functions or SQL shortcuts or macros

21
Q

Three methods an attacker can use to achieve privilege escalation?

A
  1. Use existing privileges to steal a better set of credentials 2. Exploiting vulnerabilities or weaknesses in processes that are running with escalated privileges. 3.
22
Q

SQL Injection attack?

A

Changing the where statement to ‘ or 1=1 -

23
Q

Persistent XSS attack?

A

Where XSS script is stored on the server

24
Q

Non Persistent XSS attack

A

Script is not stored on server but is injected and passed to the server

25
DOM Based XSS attack
XSS script is executed in the browser as opposed to the server
26
Pass the Hash attack?
Attacker grabs the hash used to authenticate and then passes or injects the hash in place of a password.
27
What three languages make up the DOM
28
What is TOC/TOU attack?
A time of check time of use attack is one that takes advantage of a separation between the time a program checks a value and when it uses a value.
29
What is meant by the use of single or double quotes in SQL?
Double quotes are used to indicate identifiers within the database, which are objects like tables, column names, and roles. In contrast, single quotes are used to indicate string literals.
30
What is a pointer?
A construct that refers to the memory location that holds the variable as opposed to a variable.
31
What is pointer dereferencing?
32
What is a race condition?
33
How is a directory traversal performed?
34
What is SSL stripping?
35
What is shimming?
36
What is refactoring?
37
What is a memory leak?
38
What is a buffer overflow?
39
What is an integer overflow?
40
What is a server-side request forgery?
41
What is driver manipulation?
42
Why do modern Microsoft operating systems perform driver signing?
43
Provide an example of XSRF?
44
What is an API attack?
45
How does a replay attack occur?
46
What is a DLL?
47
What is a DLL injection?
48
What is XML?
49
What is an XML attack?