Domain 7: Systems and App Security Flashcards

1
Q

Pointer overflow attack

A

Similar to buffer overflow. Attackers uses Buffer OF techniques to change it to point to malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Directory transversal

A

Web attack to jump to higher level directories on web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Covert Channel

A

Any non-standard means of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQL Escape Characters

A

Attacker uses as part of an attack script in web form field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File infecting virus

A

Attacks executables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stealth virus

A

Masks itself as another type of program to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Retrovirus

A

Attacks AV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multipartite virus

A

Attacks different parts of the host such as boot sector, exe’s, and apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File extension attack

A

Using a long file name to hide a double extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Social engineering attack. Attack on hosts file or DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rogue SW

A

Trojan that works like ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Retina

A

Vuln scanning SW like Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System-key utility

A

Defense against windows based password cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Centralized Application management (CAM)

A

Virtual Desktops, SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COPE

A

Corporate Owned Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DED

A

Dedicated computing device. aka IOT

17
Q

Private cloud

A

Internal network with Virtualization benefits

18
Q

Managed File Transfer (MFT)

A

Transfer of data to, from, in between clouds securely and reliably regardless of data file size.

19
Q

Erasure coding

A

Parity system for cloud. aka Data dispersion

20
Q

Cloud storage-level encryption

A

Encryption w/ keys managed by vendor

21
Q

Volume storage encryption

A

Cloud storage with keys managed by data admin.

22
Q

Data haven

A

Data friendly storage with low regulation/law. Could be TOR

23
Q

Directive 95/46 EC

A

Predecessor to GDPR. Non-Binding

24
Q

GDPR

A

Unify protections in 28 EU countries. Affects data transfer, accountability, sanctions

25
Data Protection Impact Assessments (DPIA)
Evaluation of "privacy by default" policy
26
Pretexting
Obtaining info through false pretenses
27
MapReduce and Hadoop
Methodologies of processing very large DB's in parallel
28
Data owner vs. Information owner
Data owner controls data on the input side. Info owner assumes control on the output side
29
JeOS
Just Enough Operating System. For virtual appliances
30
Host clustering
Host machines are logically or physically to share resources
31
Storage clustering
Servers managed and interconnected together for performance, reliability, capacity boost.
32
Loose coupled cluster
Storage cluster with JBOD
33
Tight coupled cluster
Storage cluster provided by manufacturer.