Module 24 - Host Application Threats - Q&A Flashcards

1
Q
Which of the following terms describes a security feature of a web application that checks to ensure that any data entered into the application from a user field is formatted correctly and is the correct data type?
A. Buffer checking
B. Bounds checking
C. Input validation
D. Content validation
A

C. Input validation is a security feature of a web application that checks to ensure that any data entered into the application from a user field is formatted correctly and is the correct data type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is used to attack a database through vulnerabilities in the web application, usually in user input fields?
A. SQL injection attack
B. XML injection attack
C. LDAP injection attack
D. Directory traversal attack
A

A. A SQL injection attack is used to attack a database through vulnerabilities in the web application, usually in user input fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following attacks can be performed on any directory services database to get user and computer account data?
A. Directory traversal attack
B. LDAP injection attack
C. XML injection attack
D. Integer overflow attack
A

B. An LDAP injection attack can be performed on any directory services database to get user and computer account data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following best describes an XML injection attack?
A. Sending malicious XML data into the network
B. Sending malicious XML content to a web application, taking advantage of
any lack of input validation and XML parsing
C. Sending XML data to a database
D. Sending oversized XML data to a buffer in an application

A

B. A XML injection attack involves sending malicious XML content to a web application, taking advantage of any lack of input validation and XML parsing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All of the following can help prevent a directory traversal attack except.
A. Restricting URL output
B. User input validation
C. Securing files and directories with proper permissions
D. Enabling browser helper objects on the client

A

D. Enabling browser helper objects on the client cannot help prevent a directory transversal attack, since this takes place on the client instead of the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following describes an attack that exceeds the memory allocated to an application for a particular function, causing it to crash?
A. Command injection attack
B. Remote code execution attack
C. Buffer overflow attack
D. XML injection attack
A

In a buffer overflow attack, a large amount of data is sent to the application that exceeds the memory allocated to the application for a particular function, causing it to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following attacks uses unexpected numerical results from a mathematical operation to overflow a buffer?
A. Integer overflow attack
B. SQL overflow attack
C. XML overflow attack
D. Command injection attack
A

A. An integer overflow attack uses unexpected numerical results from a mathematical operation to overflow an application’s buffers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is used to control malicious add-on attacks?
A. Bounds checking
B. Browser security settings
C. Web application configuration files
D. Input validation
A

B. The client’s browser security settings are used to control malicious addon attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following might result from arbitrary code execution? (Choose all that apply.)
A. Execution of commands, scripts, or malicious applets
B. Denial-of-service condition
C. Remote shell
D. Unauthorized access to sensitive data

A

A, B, C, D. All of these are possible through arbitrary code execution attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
An attack that has no known mitigation is known as a \_\_\_\_
A. day-one attack
B. XML injection attack
C. SQL injection attack
D. zero-day attack
A

D. An attack that has no known mitigation is known as a zero-day attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly