Chapter 4 Flashcards

1
Q

locally shared objects (LSOs)

A

files stored on
users’ computers that allow websites to collect information about visitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

secure coding concepts

A

The best practices used during the life cycle of software
development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Systems Development Life Cycle (SDLC)

A

The process of creating systems and applications,
and the methodologies used to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

secure code review

A

An in-depth code inspection procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

threat modeling

A

A way of prioritizing threats to an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

black-box testing

A

When people test a system but have no specifi c knowledge of the
system code involved with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

white-box testing

A

A method of testing applications or systems where the tester is given
access to the internal workings of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

sandbox

A

When a web script runs in its own environment for the express purpose of
not interfering with other processes, possibly for testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

input validation

A

A process that ensures the correct usage of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

fuzz testing

A

When random data is inputted into a computer program in an
attempt to fi nd vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

buffer overflow

A

When a process stores data outside the memory that the developer
intended to be used for storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

integer overflow

A

When arithmetic operations attempt to create a numeric value that is
too big for the available memory space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

remote code execution (RCE)

A

When an attacker acquires control of a remote computer
through a code vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cross-site scripting (XSS)

A

A type of vulnerability found in web applications used with
session hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cross-site request forgery (XSRF)

A

An attack that exploits the trust a website has in a
user’s browser in an attempt to transmit unauthorized commands to the website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

directory traversal

A

Also known as the ../ (dot dot slash) attack, a method of accessing
unauthorized parent directories.

17
Q

zero day attack

A

An attack that is executed on a vulnerability in software before that
vulnerability is known to the creator of the software.