Chapter 4 Review Flashcards

1
Q

Which protocol can be used to secure the email login from an Outlook client using POP3 and SMTP?

A. SMTP
B. SPA
C. SAP
D. Exchange

A

B. SPA

Secure Password Authentication is a Microsoft protocol used to authenticate email clients. S/MIME and PGP can be used to secure the actual email transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following concepts can ease administration burt can be the victim of a malicious attack?

A. Zombies
B. Backdoors
C. Buffer overflow
D. Group Policy

A

B. Backdoors

Backdoors were originally created to ease administration. However, hackers quickly found that they could use these backdoors for a malicious attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is it known as when a web script runs in its own environment and does not interfere with other processes?

A. Quarantine
B. Honeynet
C. Sandbox
D. VPN

A

C. Sandbox

When a web script runs in its own environment for the express purpose of not interfering with other processes, it is known as running a Sandbox.
Quarantining is a method used to isolate them in an area where they can do no damage VPN is short for virtual private network, which enables the connection of two hosts from remote networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To code applications in a secure manner, what is the best practice to use?

A. Cross-site scripting
B. Flash version 3
C. Input validation
D. HTML version 5

A

C. Input validation

Input validation is the best practice to use when coding applications. This is important when creating web application or web pages that require information to be inputted by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization hires you to test an application that you have limited knowledge. You are given a login to the application but do not have access to source code, What type of test are you running?

A. White-box
B. Gray-box
C. Black-box
D. SDLC

A

B. Gray-box

A gray box test is when you are given limited information about the system you are testing. Black box testers are not given logins, source code, or anything else, though they may know the functionality of the system. White box tester are given logins, source code, documentation, and more. SCDC stands for systems development life cycle , of which these types of tests are just a part.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker takes advantage of a vulnerability in programming that allows the attacker to copy more than 16 byte to ta standard 16 -byte variable. Which attack is being initiated?

A. Directory Traversal
B. Command injection
C. XSS
D. Buffer Overflow

A

D. Buffer Overflow

A buffer overflow can be initiated when a string variable allow for more than the standard amount of bytes.
Directory traversal is when an attacker uses commands and code to access unauthorized parent directories. Command injection is when commands and command syntax are entered into an application or OS. XSS or cross-site scripting is when code is injected into a website from to obtain information and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the best way to prevent SQL injection attacker on web applications?

A. Input Validation
B. Host-based firewall
C. Add HTTPS pages
D. Update the web server

A

A. Input Validation

Input validation is the best way to prevent SQL injection attacks on web servers and database servers.
Host based firewalls aid in preventing network attacks but not necessarily coded attacks on this type. HTTPS pages initial a secure transfer of data, but they don’t necessarily lock out attackers that plan on using SQL injection. Updating the web server is a good idea, but will have little if any effect on the forms that are written by the web programmer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have implemented a security technique where an automated system generates random input data to test an application. What have you put into practice?

A. XSRF
B. Fuzzing
C. Hardening
D. Input validation

A

B. Fuzzing

Fuzzing is when a person, or more commonly an automated system, enters random data into a form or application in an effort to test it.
XSRF or cross-site request forgery is an exploit of a website where unauthorized commands are issued from a trusted user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Many third party programs have security setting disabled by default. What should you as the security administrator do before deploying new software?

A. Network penetration testing
B. Input validation
C. Application whitelisting
D. Application hardening.

A

D. Application hardening.

This means updating the application, configuring strong passwords, applying policies if necessary, and in general, configuring the setting s of the application securely.
Network Penetration testing is when a group of tools is used to see if a host has open ports or other vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your organization’s servers and applications are being audited. One of the IT auditors tests an application as an authenticated user. Which of the following testing methods is being used?

A. White-box
B. Penetration testing
C. Black-Box
D. Gray-Box

A

D. Gray-Box

The IT auditor is not an employee of the company (which is often a requirement for white-box testing) but rather an outside consultant. Being an outside consultant, the IT auditor should not be given confidential details of the system to be tested. However he was given a real login, so the auditor cannot by employing black-box testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly