Common vulnerabilities

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

DLL

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources is known as:

Race condition

A malfunction in preprogrammed sequential access to a shared resource is described as:

Default configuration

A predefined username/password on a brand new wireless router is an example of:

Improper input validation

A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:

Memory leak

A situation in which an application fails to properly release memory allocated to it or continually requests more memory than it needs is called:

Buffer overflow

A situation in which an application writes to an area of memory that it is not supposed to access is referred to as:

Improper error handling

After feeding an input form field with incorrect data, a hacker gets access to debugger info providing extensive description of the error. This situation is an example of:

Vulnerable business process

An e-commerce store app running on an unpatched web server is an example of:

Undocumented assets Architecture and design weaknesses

An effective asset management process provides countermeasures against: (Select all that apply)

True

In the IT industry, the term "System sprawl" is used to describe one of the aspects of poor asset management process.

True

The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks.

Zero-day attack exploits:

Vulnerability that is present in already released software but unknown to the software developer

User education

What is the best countermeasure against social engineering?

Resource exhaustion

Which of the answers listed below describes the result of a successful DoS attack?

Inadequate vendor support Default configurations

Which of the following factors pose the greatest risk for embedded systems? (Select 2 answers)

Pointer dereference

Which of the following terms describes an attempt to read a variable that stores a null value?

Improperly configured accounts

Which of the following violates the principle of least privilege?

Integer overflow

Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?

DLL injection

Which of the terms listed below describes a type of attack that relies on executing a library of code?

EOL

Which of the terms listed below refers to a software that no longer receives continuing support?


Kaugnay na mga set ng pag-aaral

Child and Adolescent Development Test 2

View Set

Introduction to Sociology 2e Midterm (CHP. 1-7) Carl-Sandburg, Mrs.Brown

View Set

Chapter 14 smart book Management

View Set

Psychology Chapter 3 reading quiz

View Set

ATI mental health retake (focused review)

View Set

Ethics and Law in Dental Hygiene Practice Quiz Questions

View Set

AP Psychology AP Classroom Unit 2 Multiple Choice

View Set

Different forms of business and the advantages and disadvantages of each (Sole proprietorship, partnership, corporations, LLCs, cooperatives, joint venture, franchise)

View Set