Section 5: Vulnerabilities Flashcards

(41 cards)

1
Q

Type: Question & Answer
Question: What is a weakness in a system that can be exploited by a threat actor to gain unauthorised access or perform unauthorised actions on a system?

A

Answer: Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type: Question & Answer
Question: What security technique involves an attacker injecting their code into an organisation’s infrastructure to run harmful instructions?

A

Answer: Memory Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type: Multiple Choice Question (Select ALL that apply)
Question: Which of the following are examples of Memory Injection vulnerabilities?
A) Code injection
B) Buffer Overflow
C) Denial of Service
D) DLL (Dynamic Link Libraries) Injections

A

Answer: A, B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type: Question & Answer
Question: What vulnerability occurs when data intended for a buffer exceeds its storage capacity, overwriting adjacent memory locations?

A

Answer: Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type: True/False
Question: A buffer overflow can lead to malicious instructions being executed or corruption of important data.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type: Question & Answer
Question: What programming conundrum occurs when the outcome of an operation depends on the sequence or timing of other uncontrollable events, potentially leading to security flaws?

A

Answer: Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type: Multiple Choice Question (Select ONE answer)
Question: If a computer tries to do multiple things at once, and the result depends on the exact timing or order in which it happens, this indicates a:
A) Buffer overflow
B) Memory injection
C) Race condition
D) Malicious update

A

Answer: C) Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type: Question & Answer
Question: What vulnerability occurs when an attacker attempts to install a fake update to the Operating System (OS) that causes a weakness in its security?

A

Answer: Malicious Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type: True/False
Question: Malicious updates can be protected using code signing from the OS maker.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type: Question & Answer
Question: What is a weakness in the OS that can be exploited to gain unauthorised access, change permissions, or perform unauthorised actions?

A

Answer: Operating System (OS)-based Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type: True/False
Question: Using unsupported operating systems like Windows XP or Windows 7 makes systems more secure due to their age.

A

Answer: False (Unsupported OS are easier to exploit due to a lack of updates.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type: Question & Answer
Question: What type of attack involves an attacker typing malicious SQL code into an input field on a website to interact with its database?

A

Answer: Structured Query Language Injection (SQLI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type: True/False
Question: SQL injection vulnerabilities are primarily caused by strong programming practices and robust input validation.

A

Answer: False (They are caused by bad programming that doesn’t properly handle input.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type: Multiple Choice Question (Select ONE answer)
Question: An attacker typing admin’ OR ‘1’=’1 into a username field to bypass a login page is an example of a:
A) Cross-site scripting attack
B) Buffer overflow
C) SQL injection attack
D) Malicious update

A

Answer: C) SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Type: Question & Answer
Question: What web application vulnerability involves an attacker injecting nasty code (like JavaScript) into a webpage that then runs in other users’ browsers?

A

Answer: Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Type: True/False
Question: Cross-site scripting (XSS) occurs because a website carelessly displays user input without proper validation or cleaning.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Type: True/False
Question: Input validation is key to fixing Cross-Site Scripting vulnerabilities.

18
Q

Type: Question & Answer
Question: Weaknesses in low-level software that runs on hardware devices are known as:

A

Answer: Firmware Vulnerabilities

19
Q

Type: Question & Answer
Question: Devices that are no longer supported by their manufacturers, resulting in unpatched vulnerabilities, are referred to as:

A

Answer: End-of-life Hardware

20
Q

Type: Question & Answer
Question: Older hardware that may no longer be compatible with current security measures is called:

A

Answer: Legacy Hardware

21
Q

Type: Question & Answer
Question: What major security concern in virtualisation allows an attacker to break out of a virtual machine and interact with the host system?

A

Answer: Virtual Machine (VM) Escape

22
Q

Type: Question & Answer
Question: What vulnerability in virtual environments allows sensitive data to remain within system resources and be accessed by other processes?

A

Answer: Resource Re-use

23
Q

Type: Question & Answer
Question: What cloud-specific vulnerability occurs when data stored on cloud servers is targeted by hackers, potentially exposing sensitive information?

A

Answer: Data Breaches

24
Q

Type: Question & Answer
Question: Weak authentication processes, inadequate credential management, and insufficient access controls leading to unauthorised access to cloud resources are referred to as:

A

Answer: Insufficient Identity, Credential, and Access Management

25
Type: True/False Question: Cloud services accessed through interfaces and APIs that are not properly secured can be exploited.
Answer: True
26
Type: Question & Answer Question: What type of cloud vulnerability describes complex cloud infrastructure that might contain system weaknesses, which, if not addressed, can be exploited to gain unauthorised access or disrupt services?
Answer: System Vulnerabilities
27
Type: Question & Answer Question: An attacker gaining access to a user's cloud account to manipulate data, eavesdrop on transactions, and redirect clients to illegitimate websites is known as:
Answer: Account Hijacking
28
Type: Question & Answer Question: If one of the service providers gets hacked, it can act as a backdoor right into your system, highlighting a weakness in the:
Answer: Supply Chain
29
Type: True/False Question: A hardware provider placing malware directly onto a chip or building a backdoor into hardware before it reaches the client is a supply chain vulnerability.
Answer: True
30
Type: True/False Question: A bug or weakness in software from a software provider that allows attackers to break in or mess up the system is a supply chain vulnerability.
Answer: True
31
Type: Question & Answer Question: What type of cryptographic vulnerability occurs when the mathematical formulas used for encryption are no longer strong enough (e.g., DES)?
Answer: Algorithm Weakness
32
Type: Question & Answer Question: Issues related to encryption keys not being made properly, stored securely, or handled carefully enough, leading to compromised "locked" data, are known as:
Answer: Key Management Issues
33
Type: Multiple Choice Question (Select ONE answer) Question: Even if a strong algorithm is used, the way a programmer builds it into a system can mess it up, potentially causing a buffer overflow. This is an example of: A) Algorithm weakness B) Key management issue C) Poor implementation D) Data obfuscation
Answer: C) Poor Implementation
34
Type: Question & Answer Question: Improper setup or configuration of software, hardware, or network systems leading to security weaknesses is called a:
Answer: Misconfiguration Vulnerability
35
Type: Question & Answer Question: Default settings, unnecessary services being enabled, and inadequate security controls are examples of:
Answer: Misconfiguration Vulnerabilities
36
Type: True/False Question: Not installing updates on a mobile device's operating system creates a security issue.
Answer: True
37
Type: True/False Question: Using unencrypted Wi-Fi or Bluetooth connections can leave your data exposed.
Answer: True
38
Type: Question & Answer Question: What mobile device vulnerability involves removing the software restrictions on a device to get root access to the OS?
Answer: Jailbreaking
39
Type: Question & Answer Question: What is the process of installing applications on a mobile device from sources other than the official app store?
Answer: Side loading
40
Type: Question & Answer Question: What type of security flaw is discovered by an attacker before the vendor is aware of it or before a patch is released to fix it?
Answer: Zero-Day Vulnerability
41
Type: True/False Question: "Zero-day" refers to the fact that developers have zero days to fix an issue after it has already been exploited.
Answer: True