Network Security module 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the code that allows you to create a fork bomb using notepad?

%0|%0

A link to the device platform that allows a developer to access resources at a high level is known as what?

API

API

Application Programming Interface

Malware that gives access to a computer, program, or service that circumvents any normal security protections.

Backdoor

What type of attack is a pre-cursor to the collision attack?

Birthday

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer?

Blocking Ransomware

Password spraying cyber-attack can be categorized as what type of attack?

Brute Force

Which type of attack occurs if an application overruns the allocated buffer boundary and writes to adjacent memory locations?

Buffer Overflow

An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

Buffer Overflow Attack

What type of memory vulnerability attack manipulates the "return address" of the memory location of a software program?

Buffer overflow attack

An attack that takes advantage of an authentication "token" that a website sends to a user's web browser to imitate the identity and privileges of the victim.

CSRF

What attack is based on the principle that when a user is currently authenticated on a website and then loads another webpage, the new page inherits the identity and privileges of the first website?

CSRF

CSRF

Cross Site Request Forgery

What enables attackers to inject client-side scripts into web pages viewed by other users?

Cross Site Scripting

XSS

Cross site scripting

Jose receives a security report that none of the employees in his organization can access the internal server. When he logs on to the server, he receives a message that all the files on the server have been encrypted and that he must pay a fee of $600 in bitcoins to decrypt the files. What type of malware was installed on the server?

Cryptomalware

What attack targets the external software component that is a repository of both code and data?

DLL injection attack

What is known as out-of-the-box configuration?

Default Settings

An application lists all the files and subdirectories in its web folder. This indicates that the application has what weakness?

Directory Listing

What word is used today to refer to network-connected hardware devices?

Endpoint

What attack type confirms the vulnerability by revealing database-specific exceptions or error messages to the end-user or attacker?

Error Based SQL Injection

XML

Extensible Markup Language

Which type of malware relies on LOLBins?

Fileless virus

What code provides instructions to the hardware?

Firmware

What provides unauthorized access to another user's system resources or application files at the same level/role within an organization?

Horizontal Privilege Escalation

Hardware or software that silently captures and stores each keystroke that a user types on the computer's keyboard.

Keylogger

Computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it.

Logic Bomb

Malicious software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action.

Malware

Debra downloads an application on her workplace computer. As she installs the application, she notices an option to install an additional program. She unchecks the box to choose not to install the additional software. What type of malware did Debra prevent from being installed on her system?

PUP

Randall's roommate is complaining to him about all of the software that came pre-installed on his new computer. He doesn't want the software because it slows down the computer. What type of software is this?

PUP

Software apps installed on a device before the purchase are known as what?

PUP

Software that users do not want on their computer.

PUP

What is also known as a "dot dot slash" attack?

Path Traversal

PUP

Potentially Unwanted Program

What type of malware does not harm the system but only targets the data?

Ransomware

What term refers to changing the design of existing code?

Refactoring

Casey reports that she received an alert saying she was connected to a server. However, she did not connect to that server today. What attack is most likely happening?

Replay attack

Malware that can hide its presence and the presence of other malware on the computer.

Rootkit

John downloaded new calendar software and installed it. Since then, he's noticed unexpected new activity, such as pop-up windows, on the computer. What should he do first?

Run antimalware software

James has recently run a vulnerability scan and determined that the current version of SQL installed on the server is vulnerable and out of date. What is the server most vulnerable to?

SQL injection

An attack that takes advantage of a trusting relationship between web servers.

SSRF

What manipulates the trusting relationship between web servers?

SSRF

SSRF

Server side request forgery

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier which allows an attacker the opportunity to steal authenticated sessions, describes what?

Session Hijacking

SQL

Structured Query Language

What race condition can result in a NULL pointer/object dereference?

Time of check/time of use race condition

An executable program that masquerades as performing a benign activity but also does something malicious.

Trojan

What is known as a network virus?

Worm

A markup language designed to store information.

XML

An attack that inserts statements to manipulate a database server using eXtensible Markup Language (XML).

XML injection

An attack that takes advantage of a website that accepts user input without validating it.

XSS

What type of attack is based on a website accepting user input without sanitizing it?

XSS

What is technology that imitates human abilities?

ai

An infected computer placed under the remote control of an attacker for the purpose of launching attacks.

bot

Malware that encrypts all the files on the device so that none of them can be opened until a ransom is paid.

cryptomalware

An attack that changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.

integer overflow attack

An attack that depletes parts of memory and interferes with the normal operation of the program in RAM to give an attacker access to the underlying OS.

resource exhaustion attacks

A software check of the state of a resource before using that resource.

time of check/time of use

Malicious program that uses a computer network to replicate.

worm


Conjuntos de estudio relacionados

HTH 3503 Theories of Health Behavior Exam 2 Review

View Set

GEO401 - Chapter 4: Igneous Rocks

View Set

Introducing Lifespan Development Quiz

View Set

Chapter 41: Sexually Transmitted Infections-Patho http://thepoint.lww.com/Book/Show Level 3

View Set

Real Estate Principles, Chapter 13

View Set

AP English Literature & Composition

View Set

Lab 5-6: Check and Repair Filesystems: Linux installation and configuration

View Set