Phase 3 Flashcards

1
Q

What does CMMI stand for?

A

Capability Maturity Model Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many levels are there in CMMI?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At which level of CMMI are processes characterized throughout the organization?

Defined

Optimizing

Managed

Quantitatively Managed

A

Defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PCI-DSS has how many objectives?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At which level of CMMI are processes unpredictable and/or poorly controlled?

A

Initial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are the significant compliance drivers used to manage a GRC program effectively? (select all that apply)

Regulatory

Compliance

Contractual

Organizational

A

Regulatory

Contractual

Organizational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the default port used by burp suite for the proxy

A

8080

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using burp suite as a proxy, what default IP address should be pointed to for the proxy

A

Localhost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What additional steps are necessary to be able to access an https site using a proxy

A

The proxy’s TLS root CA certificate must be installed in the browser’s CA store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which section of an html document would the <title></title> tags normally be used

A

<head> section
</head>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is the anchor tag?

<ing>
<div>
<anchor>
<a>
</a></anchor></div></ing>

A

<a></a>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is inline content

A

When all html and other elements exist in one single page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is linked content

A

When one page has html with references to separate files containing css and Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of vulnerability allows attackers to execute unauthorized commands on the server by exploiting improperly sanitized input fields?

A

Command Injection .
Is a vulnerability that allows an attacker to execute arbitrary commands on a host operating system through a vulnerable app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Attack uses the users currently authenticate session to forge a request to a web application ?

A

Cross site request forgery (csrf) tricks the victim into submitting a malicious request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What vulnerability occurs when a web application allows the upload of executable scripts as files?

A

File inclusion lfi. And upload vulnerability

These vulnerabilities allow attackers to include files on the server or upload dangerous files to a server

LFI local file inclusion
Rfi remote file inclusion

17
Q

What vulnerability is present if an attacker can programmatically bypass a web application captcha

A

Using an insecure captcha occur when captcha implementation is weak allowing automated systems to attack

18
Q

Which vulnerability allows attackers to manipulate backend databases through unsanitized input fields

A

SQL injection involves inserting a SQL query via the input data from the client to the application

19
Q

What vulnerability could allow an attacker to predict or brute force a session token

A

Weak session ids are vulnerable to interception or prediction, allowing attackers to hijack a users session

20
Q

What type of vulnerability allows attackers to inject client-side scripts into web pages viewed by other users

A

Cross-site scripting(xss) allows attackers to inject malicious scripts into content viewed by other users. Stored xss persists on the server, while reflected xss is returned in the response

21
Q

What are the 6 levels of the software development cycle

A

Planning
Analysis
Design
Implementation
Testing and integration
Maintenance

22
Q

Where is the default Apache configuration file in fedora linux?

A

/etc/httpd/conf

23
Q

Why should the 404 page be customized

A

Obfuscate the details about apache server, to minimize known attacks

24
Q

What is java

A

A compiled, statically typed language that is used to develop a wide variety of applications, including desktop software, mobile apps and web servers

25
What is javascript
Interpreted dynamically typed language primarily used to add interactivity to web pages
26
What is Metadata?
Data about the data or object
27
What designates Javascript in an html document?
28
What is Race condition?
An attack method where attacker races against a vulnerable application by exploiting the gap between testing and accessing the file. Also known as TOCTOU
29
How many directories deep does mkdir -p $(python3 -c 'print ("A/"*50)') create?
50
30
In the command mkdir -p $(python3 -c 'print("A/"*50)') what does the -p do?
Creates parent directories, as needed
31
Which SQL command allows us to query a database for current values?
SELECT
32
Which SQL command returns all the values in a table named people?
SELECT * FROM people;
33
Which SQL command allows new records to be created in a table called people?
INSERT INTO people (username,firstname,lastname,pass) VALUES("uname","some","one","password1!);
34
Where does PHP scripting run?
Server side
35
Why would a programmer choose a compiled language instead of an interpreted one?
Compiled code tends to be faster and more efficient
36
Using xdd on a file, you get the following output. What type of file is this? 00000000: 2321 2f62 686e 2f62 6173 680a
Bash script
37
What does -m32 flag do with gcc?
Compiles code into 32bit binary