IAW

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following mistakes is most often associated with a security misconfiguration threat? A) Unsafe key storage B) Failure to disable default accounts C) Cross-site request forgery D) Bad cryptography

B

A __________ is used to connect to a remote system using NetBIOS. A. NULL session B. Hash C. Rainbow table D. Rootkit

a

An attacker can use __________ to enumerate users on a system. A. NetBIOS B. TCP/IP C. NetBEUI D. NNTP

a

IPsec uses which two modes? A. AH/ESP B. AES/DES C. EH/ASP D. AES/ESP

a

In IPsec, what does Encapsulating Security Payload (ESP) provide? A. Data security B. Header security C. Authentication services D. Integrity

a

In which of the following scenarios should you use the escaping technique? a. When user input is echoed back to the user in HTML b. When you need to validate any input as valid input c. When you are trying to protect against regular expression injection d. When you need to tell the interpreter that input is code

a

Port number __________ is used for SMTP. A. 25 B. 110 C. 389 D. 52

a

State whether the following statement is True or False. If user input can be confused for instructions in the language or the way the language is applied, then the language is vulnerable to an injection attack. a. True b. False

a

State whether the following statement is True or False. Most security issues are related to input and a user's ability to interact with and control input. a. True b. False

a

State whether the following statement is True or False. Time of Check Time of Use (TOCTOU) occurs if the authorization check is performed on one page of a Web site and the resource is used on a different page. a. True b. False

a

Symmetric cryptography is also known as __________. A. Shared key cryptography B. Public key cryptography C. Hashing D. Steganography

a

Symmetric key systems have key distribution problems due to __________. A. Number of keys B. Generation of key pairs C. Amount of data D. Type of data

a

VRFY is used to do which of the following? A. Validate an email address B. Expand a mailing list C. Validate an email server D. Test a connection

a

What does hashing preserve in relation to data? A. Integrity B. Confidentiality C. Availability D. Repudiation

a

What should you do before passing credentials over the network? a. Replace the credentials with a cryptographic salt and hash. b. Accept session IDs from URLs. c. Share the credentials with the client. d. Use persistent cookies to manage session IDs.

a

Which character is most likely to be used for an SQL injection attack? a. Single quote (') b. Null (\0) bytec. Less than sign(<) d. Greater than sign(>)

a

Which mitigation technique can help you strictly define valid input? a. Allow list b. Memory size checks c. Table indirection d. Escaping

a

Which of the following are injection attacks? a. Cross-site scripting b. Cross-site request forgery c. Insecure direct object references d. Broken authentication and session management

a

Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client? a. Reflected XSS b. Persistent XSS c. Insecure direct object references d. Failure to restrict URL access

a

Which of the following can result in insecure cryptography? a. Unsalted hash b. Unused services c. Default accounts d. Rotating keys frequently

a

Which of the following consequence is most likely to result if your production environment does not match your development, testing, and staging environments? a. Your application may not work as expected. b. Testing your application may take a long time. c. Your application may be expensive to administer. d. Your application may have too many configuration files.

a

Which of the following factors helps you secure keys? a. Complexity b. Session-based indirection c. Escaping d. Encryption

a

Which of the following functionalities should you include in an authentication and session management system? a. Logout functionality b. Regular expressions c. Escaping functionality d. Forwarding system functionality

a

Which of the following input sources can be directly controlled by a malicious user? a. GET/POST parameters b. Server configuration files c. Ports d. Server code

a

Which of the following is a common hashing protocol? A. MD5 B. AES C. DES D. RSA

a

Which of the following is the best way to mitigate the threat of an insecure direct object reference attack? a. Use session-based indirection. b. Use POST parameters instead of GET parameters. c. Use a regular expression. d. Send successful logins to a well-known location instead of automatic redirection.

a

Which of the following is the best way to prevent malicious input exploiting your application? a. Input validation using an allow List b. Using encryption c. Using table indirection d. Using GET/POST parameters

a

Which of the following is the best way to prevent unvalidated redirect and forwards vulnerabilities? a. Use an allow list, such as table indirection. b. Use client-side validation. c. Allow only absolute redirects. d. Use session-based indirection.

a

Which of the following is the best way to protect a Web application from unvalidated redirects and forwards? a. Validate the referrer header. b. Use extended validation certificates. c. Use the escaping technique. d. Disallow requests to unauthorized file types.

a

Which of the following is the best way to reevaluate your environment and address new threats? a. Add or remove network segments. b. Use the white-list validation of allowed input technique. c. Use custom cryptographic algorithms. d. Use your browser to forge unauthorized requests.

a

Which of the following is the most common result of a cross-site request forgery? a. Elevation of privilege b. Disabled security features c. Enabling of IPSec d. Misconfigured security features

a

Which of the following languages are the primary targets of cross-site scripting? a. HTML b. SQL c. XSLT d. XPath

a

Which of the following procedures are involved in the hardening process? a. Disable unnecessary features. b. Resubmit POST parameters during redirection. c. Repeat the process at random intervals. d. Update the environment with changes only when needed.

a

Which of the following scenarios is most likely to cause an injection attack? a. Unvalidated input is embedded in an instruction stream. b. Unvalidated input can be distinguished from valid instructions. c. A Web application does not validate a client's access to a resource. d. A Web action performs an operation on behalf of the user without checking a shared secret.

a

Which of the following scenarios is most likely to result in broken authentication and session management vulnerabilities? a. Poorly implemented custom code is used . b. Session-based indirection is used. c. Unused and unnecessary services, code, and DLLs are disabled. d. The HttpOnly flag is set in cookies.

a

Which of the following tasks is performed by a session-based system? a. Identifying returning users b. Using form variables for managing session IDs c. Using the HTTP protocol d. Sending successful logins to a well-known location

a

Which of the following would confirm a user named chell in SMTP? A. vrfy chell B. vrfy -u chell C. expn chell D. expn -u chell

a

Which threat is most likely to occur when a POST parameter performs an operation on behalf of a user without checking a shared secret? a. Cross-site request forgery b. Insecure direct object reference c. Cross-site scripting d. Injection

a

Who first developed SSL? A. Netscape B. Microsoft C. Sun D. Oracle

a

You should set the HttpOnly flag in a cookie to ensure that: a. The cookie is not available to client scripts. b. The cookie is deleted when the user closes the browser. c. The cookie is sent over an encrypted channel. d. The cookie is a persistent cookie

a

Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? a. Injection b. Insecure direct object references c. Failure to restrict URL access d .Insufficient transport layer protection

a

__________ involves grabbing a copy of a zone file. A. Zone transfer B. nslookup transfers C. DNS transfer D. Zone update

a

70.Which of the following mistakes is most often associated with a security misconfiguration threat? A) Unsafe key storage B) Failure to disable default accounts C) Cross-site request forgery D) Bad cryptography

b

A public key is stored on the local computer by its owner in a __________. A. Hash B. PKI system C. Smart card D. Private key

b

Asymmetric encryption is also referred to as which of the following? A. Shared key B. Public key C. Hashing D. Block

b

How does malicious input flow in a DOM-based XSS? a. From server to client b. From client to itself c. From attacker to server d. From victim to server

b

SSL is a mechanism for which of the following? A. Securing stored data B. Securing transmitted data C. Verifying data D. Authenticating data

b

State whether the following statement is True or False. An identification token is a replacement for a user's credentials and should allow access to restricted resources of a Web site. a. True b. False

b

State whether the following statement is True or False. HTTP GET parameters limit the types of manipulation a malicious user can perform on the victim to forge a request. a. True b. False

b

State whether the following statement is True or False. The downside of a nonce is that it needs to be stored on the client. a. True b. False

b

State whether the following statement is True or False. When implementing an authentication or session system, you should ensure that new session IDs are not created at login. a. True b. False

b

State whether the following statement is True or False. You should use a blacklist wherever possible; use whitelists only as a secondary defense. a. True b. False

b

Which of the following actions should you take before implementing a custom authentication and session management system? a. Find out if the HttpOnly flag is set in cookies. b. Find out if you can use a small extension to an existing component to implement the system. c. Find out if form variables are available to store data. d. Find out if you need to use session-based indirection.

b

Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? a. Allow list b. Table indirection c. Escaping d. Memory size checks

b

Which of the following combines public-key cryptography with a cryptographic hash? a. Nonce b. Digital signature c. SSL d. Salt

b

Which of the following is most likely to result in insecure cryptography? a. Unused services b. Unsalted hash c. New products d. MISSING PATCHES

b

Which of the following is the best way to define disallowed inputs? a. Allow list b. Block list c.Table indirection d. Escaping

b

Which of the following is the best way to ensure that JavaScript cannot be used to access a cookie? a. Set the secure flag in the cookie b. Set the HttpOnly flag in the cookie c. Use the CAPTCHA system d. Use non-persistent cookies

b

Which of the following is the best way to protect against injection attacks? a. SQL queries based on user input b. Input validation using an allow list c. Memory size checks d. Validate integer values before referencing arrays

b

Which of the following may result in cryptographic weakness? a. Failure to restrict URL access b. Insufficient cryptographic protocols c. Missing patches d. Unnecessary/unused services or features

b

Which of the following objects is most susceptible to an insecure direct object reference attack? a. Nonpersistent cookies b. Registry keys c. Conditional constructs d. GET/POST parameters

b

Which of the following should you use to protect the connections between the physical tiers of your application? a. EFS b. SSL Correct c. HTTP d. Kerberos

b

Which of the following threats is most likely to be caused by poor input validation? a. Enabling of IPSec b. Insecure direct object reference c. Insecure cryptographic storage d. Insufficient transport layer protection

b

You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to? a. Injection b. Security misconfiguration c. Insecure cryptographic storage d. Cross-site request forgery

b

Your Web application stores information about many accounts. Which threat is your Web application susceptible to if you can manipulate the URL of an account page to access all accounts? a. Cross-site request forgery b. Insecure direct object reference c. Cross-site scripting d. Injection

b

__________ is a method for expanding an email list. A. VRFY B. EXPN C. RCPT TO D. SMTP

b

__________ is used to synchronize clocks on a network. A. SAM B. NTP C. NetBIOS D. FTP

b

A message digest is a product of which kind of algorithm? A. Symmetric B. Asymmetric C. Hashing D. Steganography

c

A public and private key system differs from symmetric because it uses which of thefollowing? A. One key B. One algorithm C. Two keys D. Two algorithms

c

An attacker submits data to the server and the data is stored on the server. Which type of vulnerability is most likely to occur in your application? a. DOM-based XSS b. Reflected XSS c. Persistent XSS d. Cross-site request forgery

c

Enumeration does not uncover which of the following pieces of information? A. Services B. User accounts C. Ports D. Shares

c

In IPsec, encryption and other processes happen at which layer of the OSI model? A. Level 1 B. Level 2 C. Level 3 D. Level 4

c

In IPsec, what does Authentication Header (AH) provide? A. Data security B. Header security C. Authentication services D. Encryption

c

Which mitigation technique helps you tell the parser that a specific character is a literal and not a control character? a. Table indirection b. Allow list c. Escaping d. Block list

c

Which of the following best describes PGP? A. A symmetric algorithm B. A type of key C. A way of encrypting data in a reversible method D. A key escrow system

c

Which of the following best describes hashing? A. An algorithm B. A cipher C. Nonreversible D. A cryptosystem

c

Which of the following consequences is most likely to occur due to an injection attack? a. Spoofing b .Cross-site request forgery c .Denial of service d .Insecure direct object references

c

Which of the following depicts the typical impact of failure to restrict URL access? a. Attackers perform man-in-the-middle attacks. b. Attackers impersonate any user on the system. c. Attackers invoke functions and services they have no authorization for. d. Attackers perform all actions that the victims themselves have permission to perform.

c

Which of the following is an authentication system mandatory requirement? a.Form variables are used for managing session IDs. b. Use a GOTCHA to prevent automated attacks. c. User logout and session inactivity controls. d. Session IDs are only accepted from cookies and parameter variables.

c

Which of the following is most vulnerable to injection attacks? a. Session IDs b. Registry keys c. Regular expressions d. Server configuration files

c

Which of the following is the best way to detect unvalidated redirects and forwards? a. Use internal transfers without authorizing the user for target URL b. Use your browser to forge unauthorized requests c. Use weblogs to identify redirects and forwards d. Use policy mechanisms

c

Which of the following practices should you observe in order to implement defense-in-depth techniques against CSRF attacks? a. Use GET parameters b. Use automatic redirection. c. Don't include secrets in the URL. d. Resubmit POST parameters during redirection.

c

Which of the following protocols is a network layer encryption protocol? a. HTTP b. EFS c. IPSec d. Kerberos

c

Which threat is most likely to occur when a Web application fails to validate a client's access to a resource? a. Injection b. Cross-site scripting c. Insecure direct object reference d. Cross-site request forgery

c

Why should you use CAPTCHA? a. To create cryptographically random session IDs b. To protect credentials by using encryption or cryptographic salt and hash c. To protect authentication systems from automated or brute-force attacks d. To ensure that authentication systems implement inactivity timeout functionality

c

You should set a secure flag in a cookie to ensure that: a. The cookie is a persistent cookie. b. The cookie is not available to client script. c. The cookie is sent over an encrypted channel. d. The cookie is deleted when the user closes the browser.

c

A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? a. It should identify returning users to the site. b. It should be public information. c. It should always use a persistent cookie. d. It should always use a non-persistent cookie.

d

An attacker lures a victim to malicious content on a Web site. A request is automatically sent to the vulnerable site which includes victim's credentials. Which attack is most likely to occur in this scenario? a. Injection b. Cross-site scripting c. Insecure direct object reference d. Cross-site request forgery

d

At what point can SSL be used to protect data? A. On a hard drive B. On a flash drive C. On Bluetooth D. During transmission

d

Enumeration is useful to system hacking because it provides which of the following? A. Passwords B. IP ranges C. Configurations D. Usernames

d

What should you add to an HMAC to ensure that the secret value is unique for each request? a. Salt b. Nonce c. Session ID d. Timestamp

d

Which location should you ideally use to store a session ID? a. URLs b. Form variables c. Persistent cookies d. Non-persistent

d

Which of the following actions should you take to test the security of your Web application? a. Use policy mechanisms. b. Use a simple and positive model at every layer. c. Set the secure flag on session ID cookies. d. Use your browser to forge unauthorized requests.

d

Which of the following does IPsec use? A. SSL B. AES C. DES D. PKI

d

Which of the following is most likely to result from unvalidated redirects and forwards? a. Brute force attack b. Network sniffing c. Man-in-the-middle attack d. Bypassed authorization checks

d

Which of the following is the best way to prevent a DOM-based XSS attack? a. Set the HttpOnly flag in cookies b. Ensure that session IDs are not exposed in a URL c. Ensure that a different nonce is created for each request d. Validate any input that comes from another Web site

d

Which of the following manages digital certificates? A. Hub B. Key C. Public key D. Certificate authority

d

Which of the following vulnerabilities is most likely to occur due to an insecure direct object reference attack? a. Executing commands on the server. b. Impersonating any user on the system. c. Modifying SQL data pointed to by the query. d. Accessing a resource without authorization.

d

Which system does SSL use to function? A. AES B. DES C. 3DES D. PKI

d


Conjuntos de estudio relacionados

Disorders of the Eye: Retinal Detachment, Glaucoma, and Cataracts

View Set

Pharm - Archer Review (2/4) - Cardiovascular, Hematological/Oncolgical, Blood and Blood Products, Infectious Disease, Immune

View Set

Terms In Reference To Kenneth Burke's Pentad

View Set

ACCT 2101: Final Exam Practice Questions

View Set

Chapter 10 practice questions (Jake)

View Set

Data Structure Exam 2 Multiple choice

View Set

Chapter 7: The Skeletal System: The Axial Skeleton

View Set