Understanding Application Security and Attack Mitigation Best Practices Flashcards

1
Q

Secure Software Development Life Cycle (SSDLC)

A

A method of system development that incorporates security controls in every phase of the system’s lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password Spraying

A

A brute force attack in which multiple user accounts are tested with a dictionary of common passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Credential stuffing

A

A brute force attack in which stolen user account names and passwords are tested against multiple websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Block Authentication

A

A software vulnerability where the authentication mechanism allows an attacker to gain entry, such as displaying cleartext credentials, using weak session tokens, or permitting brute force login requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Input Validation

A

Any technique used to ensure that the data entered into a field or variable in an application is handled appropriately by that application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Output Encoding

A

Coding methods to sanitize output created from user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Parameterized Queries

A

A technique that defends against SQL injection by incorporating placeholders in a SQL query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is SSDLC different from SDLC?

A

SSDLC formally requires security considerations to be included in each phase of development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Buffer overflow

A

An attack in which data goes past the boundary of the destination buffer and begins to corrupt adjacent memory. This can allow the attacker to crash the system or execute arbitrary code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Heap overflow

A

A software vulnerability where input is allowed to overwrite memory locations within the area of a process’s memory allocation used to store dynamically sized variables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integer overflow

A

An attack in which a computed result is too large to fit in its assigned storage space, which may lead to crashing or data corruption, and may trigger a buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

address space layout randomization (ASLR)

A

A technique that randomizes where components in a running application are placed in memory to protect against buffer overflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SQL injection

A

An attack that injects a database query into the input data directed at a server by accessing the client side of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Directory Traversal

A

An application attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cross-site scripting (XSS)

A

A malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

File Inclusion

A

A web application vulnerability that allows an attacker either to download a file from an arbitrary location on the host file system or to upload an executable or script file to open a backdoor.

17
Q

Session Hijacking

A

A type of spoofing attack where the attacker disconnects a host then replaces it with his or her own machine, spoofing the original host’s IP address.

18
Q

cross-site request forgery (XSRF)

A

A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.

19
Q

cross-site request forgery (XSRF)

A

A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.

20
Q

Server-side request forgery (SSRF)

A

An attack where an attacker takes advantage of the trust established between the server and the resources it can access, including itself.

21
Q

Stored XSS

A

This type of XSS attack inserts the malicious code into the web application, oftentimes by putting the script syntax into a comment field used by the web application, so that the script runs for all future visitors.

22
Q

Security Patching

A

This critical security measure is not available for end-of-life applications.

23
Q

Encryption

A

Implementing key management practices is associated with this control.