Chapter 7 Flashcards

1
Q

What is spoofing?

A

Change data to impersonate another system or person. MAC spoofing attacks change the source MAC address and IP spoofing attacks change the source IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SYN Flood Attacks?

A

It is a common attack used against servers on the Internet. They are easy for attackers to launch, difficult to stop, and can cause significant problems because it can disrupt TCP handshake process and prevent legitimate clients from connecting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MITM?

A

Man in the middle attack is a form of active interception or active eavesdropping. It uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ARP poisoning?

A

Attack that misleads computers or switches about the actual MAC address of a system. The MAC address is the physical address, or hardware address, assigned to NIC. ARP resolves the IP addresses of systems to their hardware address and stores the result in an area of memory known as ARP cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DNS poisoning?

A

Attempts to modify or corrupt DNS results. A successful DNS poisoning attack can modify the IP address associated with a domain name and replace it with the IP address of a malicious web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a pharming attack?

A

A type of attack that manipulates the DNS name resolution process. It tries to corrupt DNS server or the DNS client. A successful farming attack redirects a user to a different web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is amplification attack?

A

It is a type of DDoS attack. It typically uses a method that significantly increases the amount of traffic sent to, or requested from, a victim.

  • A ping is normally unicast
  • Smurf attack sends the ping out as a broadcast.
  • Smurf attack spoofs the source IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is brute force attack?

A

It is the attempt to guess all possible character combinations either online or offline.

  • Online password attack attempts to discover a password from an online system.
  • Offline password attacks attempt to discover passwords from a captured database or captured packet scan.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a dictionary attack?

A

Uses dictionary of words and attempts every word in the dictionary to see if it works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are password hash attacks?

A

Attacking the hash of a password to figure out the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Pass the hash attack?

A

When the attacker discovers the hash of the user’s password and uses it to log on to the system as the user. Any authentication protocol that passes the hash over the network in an unencrypted format is susceptible to this attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is birthday attack?

A

An attacker creates a password that produces the same hash as the user’s actual password and takes advantage of hash collision which occurs when hashing algorithm creates the same hash from different passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is rainbow table attacks?

A

Type of attack that attempts to discover the password from the hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a salt?

A

It is a set of random data such as two additional characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is replay attacks?

A

Attacker replays data that was already part of a communication session. A third party attempts to impersonate a client that is involved in the original session. This can occur on both wired and wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is known plaintext attacks?

A

An attacker can launch a known plaintext attack if there is samples of both the plaintext and cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is typo squatting?

A

Occurs when someone buys a domain name that is close to a legitimate domain name and when someone auto completes or type the name wrong they will be lead to the malicious website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is clickjacking?

A

Tricks users into clicking something other than what they think they’re clicking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is session hijacking?

A

It takes advantage of session IDs stored in cookies. When a user logs on to a website, the website often returns a small text file with a session ID.
The attacker uses the user’s session ID to impersonate the user. The web server doesn’t know the difference between the original user and the attacker because it is only identifying the user based on session ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is domain hijacking?

A

An attacker changes the registration of a domain name without permission from the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is man in the browser attack?

A

It is a type of proxy Trojan horse that infects vulnerable web browsers. Successful man-in-the-browser attacks can capture browser session data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is shimming?

A

Provides a solution that makes it appear older drivers are compatible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is refactoring code?

A

It is the process of rewriting the internal processing of the code without changing its external behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is zero-day vulnerability?

A

It is a weakness or bug that is unknown to trusted sources such as operating system and antivirus vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a memory leak?

A

It is a bug in a computer application that causes the application to consume more and more memory the longer it runs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is integer overflow?

A

It attack attempts to use or create a numeric value that is too big for an application to handle. The result is the application give inaccurate results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a buffer overflow?

A

When an application receives more input, or different input than it expects. The result is an error that exposes system memory that would otherwise be protected and inaccessible.
Buffer overflow allows access to memory locations beyond application’s buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is pointer dereference?

A

It is the process of using the pointer to access the data array.

29
Q

What is DLL injection?

A

Dynamic Link Library is a compiled set of code that an application can use without re-creating the code. DLL injection is an attack that injects a DLL into a system’s memory and causes it to run.

30
Q

What is input validation?

A

It is the practice of checking data for validity before using it. It prevents attacker from sending malicious code that an application will use by either sanitizing the input to remove malicious code or rejecting the input.

31
Q

What is the proper input validation?

A

Verifying proper characters, implementing boundary or range checking, blocking HTML code, and preventing the use of certain characters.

32
Q

What is race condition?

A

When two or more modules of an application or two or more applications, attempt to access a resource at the same time, it can cause a conflict.

33
Q

What is error-handling?

A

Ensure that an application can handle an error gracefully.

Errors to users should be general, and detailed information should be logged.

34
Q

What is code signing?

A

It is the process that provides a digital signature for the code and certificate includes a hash of the code.

35
Q

What is dead code?

A

Code that is never executed or used.

36
Q

What is obfuscation?

A

Attempts to make something unclear or difficult to understand. It rename variables, replace numbers with expressions, replace strings of characters with hexadecimal codes, and remove comments.

37
Q

What are common methods of testing code?

A

Static code analyzers, dynamic analysis, sandboxing, and model verification.

38
Q

What is static code analyzers?

A

Examines the code without executing it.

39
Q

What is dynamic analysis?

A

Checks the code as it is running. A common method is to use fuzzing which uses a computer program to send random data to an application.

40
Q

What is stress testing?

A

Attempts to simulate a live environment and determine how effective or efficient an application operates with a load.

41
Q

What is sandboxing?

A

Sandbox is an isolated area used for testing programs.

42
Q

What is model verification?

A

Process of ensuring that software meets specifications and fulfills its intended purposes.

43
Q

What is the waterfall model?

A

Each stage of waterfall feeds the next stage and some stages are requirements, design, implementation, verification, and maintenance.

44
Q

What is secure DevOps?

A

It is a software development process that includes extensive communication between software developers and operations personnel.

45
Q

What is security automation?

A

Automated tests to check code.

46
Q

What is continuous integration?

A

It is the process of merging code changes into a central repository. The software is then built and tested from this central repository.

47
Q

What is baselining?

A

Applying changes to the baseline code every day and building the code from these changes.

48
Q

Immutable systems?

A

It cannot be changed.

49
Q

What is infrastructure as code?

A

Managing and provisioning data centers with code that defines virtual machines (VMs).

50
Q

What is change management?

A

Helps ensure that developers do not make unauthorized changes.

51
Q

What is version control?

A

Tracks the versions of software as it is updated, including who made the update and when.

52
Q

What are the two primary applications used for web servers?

A

Apache, and Internet Information Services (IIS)

53
Q

What is normalization?

A

Database refers to organizing the tables and columns to reduce redundant data and improve overall database performance.

54
Q

What criteria does a database needs to meet to be 1NF?

A

First normal form

  • Each row within a table is unique and identified with a primary key.
  • Related data is contained in a separate table.
  • None of the columns include repeating groups.
55
Q

What is 2NF?

A

Second normal form only applies to tables that have a composite primary key where two or more columns make up the full primary key.

56
Q

What criteria does a database needs to meet to be 2NF?

A
  • It is 1NF

- Non-primary key attributes are completely dependent on the composite primary key.

57
Q

What does 3NF helps?

A

Third normal form helps eliminate unnecessary redundancies within a database.

58
Q

What criteria does a database needs to meet to be 3NF?

A
  • It is 2NF
  • All columns that aren’t primary keys are only dependent on the primary key. None of the columns in the table are dependent on non-primary key attributes.
59
Q

How does attackers use SQL injection?

A

Pass queries to back-end databases through web servers.

60
Q

What is stored procedures?

A

A group of SQL statements that execute as a whole, similar to a mini-program. A parameterized stored procedure accepts data as an input called a parameter.

61
Q

What are common injection attacks?

A

Attackers inject operating system commands into an application using web page forms or text boxes.

62
Q

What is cross-site scripting (XSS)?

A

It is another web application vulnerability that can be prevented with input validation techniques. Attackers embed malicious HTML or JavaScript code into a web site’s code.

63
Q

What is cross-site request forgery (XSRF)?

A

Attack where an attacker tricks a user into performing an action on a web site. The attacker creates a specially crafted HTML link and the user performs the action without realizing it.

64
Q

What is framework?

A

It is a structure used to provide a foundation. Generic categories of frameworks are regulatory, non-regulatory, national versus international, and industry-specific.

65
Q

What is the regulatory framework?

A

It is based on relevant laws and regulations.

66
Q

What is non-regulatory framework?

A

It is not required by any law. It identifies common standards and best practices that organizations can follow.

67
Q

What is national versus international?

A

Used within a single country, while others are used internationally.

68
Q

What is industry-specific?

A

Frameworks only apply to certain industries.