CNA 210 | Ch. 9, Client and Application Security

Ace your homework & exams now with Quizwiz!

Wi-Fi enabled microSD card

A Secure Digital Input Output (SDIO) card that can wirelessly transmit across a network.

Security template

A collection of security configuration settings.

client

A computing device that has software to enable it to send requests to servers.

Application development lifecycle model

A conceptual model that describes the different stages involved in creating an application

Service pack

A cumulative package of all patches and feature updates.

Cable lock

A device that can be inserted into the security slot of a portable device and rotated until secured to the device to prevent it from being stolen.

Mantrap

A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas.

Deadbolt lock

A door lock that extends a solid metal bar into the door frame for extra security.

Group Policy

A feature that provides centralized management and configuration of computers and remote users who are using specific Microsoft directory services known as Active Directory (AD)

Cage

A fenced secure waiting station area, such as an area that can contain visitors to a facility until they can be approved for entry.

Security guard

A human who is an active security element.

D. deadbolt lock

A lock that extends a solid metal bar into the door frame for extra security is the . A. triple bar lock B. deadman's lock C. full bar lock D. deadbolt lock

Door lock

A lock that requires a key or other device to open doors.

Change management

A methodology for making modifications to a system and keeping track of those changes.

Supply chain

A network that moves a product from the supplier to the customer. Typically made up of vendors that supply raw material, manufacturers who convert the material into products, warehouses that store products, distribution centers that deliver them to the retailers, and retailers who bring the product to the consumer.

heuristic monitoring (dynamic analysis)

A newer approach to AV which uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches.

Unified Extensible Firmware Interface (UEFI)

A newer mechanism that replaced the BIOS for startup.

antispyware

A package that helps prevent computers from becoming infected by different types of spyware.

Pointer deference

A pointer with a value of NULL used as if it pointed to a valid memory area.

Secure Digital (SD)

A popular type of removable data storage that is available in three different form factors.

Least functionality

A principle in which a user is given the minimum set of permissions required to perform necessary tasks.

Buffer overflow

A process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

Up-to-date resets

A process that makes resetting and getting all updates on a PC much faster than before when hours would be required to install all subsequent patches.

D. Cable conduit

A protected distribution system (PDS) refers to _________. A. Highly secured usernames and passwords B. Controlled hallways and work spaces C. Key management D. Cable conduit

Patch

A publicly released software security update intended to repair a vulnerability.

Access log

A record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area.

Screen filter

A screen that "blacks out" viewers outside the normal direct viewing angle of a display.

Dead code

A section of an application that executes but performs no meaningful function.

Automated patch update service

A service used to manage patches within an enterprise instead of relying upon the vendor's online update service.

Bollard

A short but sturdy vertical post that is used to block vehicular traffic.

microSD

A smaller form factor type of Secure Digital card commonly used in smaller devices such as smartphones, digital cameras, and tablets.

Bayesian filtering

A software that divides email messages that have been received into two piles, spam and nonspam and then does a word count analysis on each message.

Closed circuit television (CCTV)

A specific and limited set of devices that receive transmissions from video surveillance cameras.

Secure DevOps

A specific type of software methodology that follows the agile model and heavily incorporates security concepts.

Staging stage

A stage in application development that performs a quality assurance test to verify that the code functions as intended.

Testing stage

A stage in which an application is tested for any errors that could result in a security vulnerability.

Development stage

A stage of application development in which the requirements for the application are established and it is confirmed that the application meets the intended business needs before the actual coding begins.

Secure Boot

A standard designed to be used with UEFI to ensure that a computer boots using only software that is trusted by the computer manufacturer.

Barricade

A structure designed to block the passage of traffic.

Stored procedure

A subroutine available to applications that access a relational database.

Protected Distribution System (PDS)

A system of cable conduits that is used to protect classified information being transmitted between two secure areas.

Fencing

A tall, permanent structure to keep out individuals for maintaining security.

Model verification

A test used to ensure that the projected application meets all specifications at that point.

Sandbox

A testing environment that isolates untested code from the live production environment.

Alarmed carrier PDS

A type of PDS where the carrier system is deployed with specialized optical fibers in the conduit that can sense acoustic vibrations that occur when an intruder attempts to gain access to the cables, which triggers an alarm.

Hardened carrier PDS

A type of PDS where the data cables are installed in a conduit that is constructed of special electrical metallic tubing or similar material.

Popup blocker

A type of spyware used for decreasing the amount of unwanted advertisements on a user's screen while browsing the internet.

Memory leak

A vulnerability that occurs when an application dynamically allocates memory but does not free that memory when finished using it.

Sign

A written placard that displays a warning, such as a notice that an area is restricted.

least functionality

According to the concept of ____, a user should only be given the minimum set of permissions required to perform necessary tasks.

Proper input validation

Accounting for errors such as incorrect user input.

Integrity measurement

An "attestation mechanism" designed to ensure that an application is running only known and approved executables.

Kernel pruning

An OS hardening technique removes all unnecessary features that may compromise an operating system.

Reduce capabilities

An OS hardening technique significantly restricts what resources can be accessed and by whom.

Read-only file system

An OS hardening technique that makes it so important operating system files cannot be changed.

Least privilege

An OS hardening technique that removes all supervisor or administrator accounts that can bypass security settings and instead splits privileges into smaller units.

Secure Digital Input Output (SDIO)

An SD storage card with integrated wireless transmission capabilities, using Bluetooth or Wi-Fi technology.

Agile model

An application development lifecycle model that follows an incremental approach.

Waterfall model

An application development lifecycle model that uses a sequential design process.

Production stage

An application development stage in which the application is released to be used in its actual setting.

DLL injection

An attack that inserts code into a running process through a Dynamic Link Library.

Executable files attack

An attack that tricks the vulnerable application into modifying or creating executable files on the system.

BIOS attack

An attack used by threat actors to infect a computer during a firmware update.

Alarm

An audible sound to warn a guard of an intruder.

pull yourself up by your own bootstraps

An expression that was used to describe an impossible task of lifting oneself off the ground by pulling on the bootstrap. This term was eventually adapted to describe the computer startup process. (Possible bonus)

Trusted OS

An operating system that has been designed through OS hardening.

Static analysis

Another name for signature-based monitoring.

Fuzzing or Heuristic monitoring

Another term used for dynamic analysis.

host

Any end device in a network.

Supply chain infections

Attack where malware is injected into products during manufacturing or storage steps.

read-only memory (ROM) flash memory

BIOS firmware was originally stored in ___, but was latter moved to ____ so it could be easily updated.

Telecommunications Electronics Material Protected from Emanating Spurious Transmissions (TEMPEST)

Classified standard created by the United States government intended to prevent attackers from picking up electromagnetic fields from government buildings.

Cipher lock

Combination locks that use buttons that must be pushed in the proper sequence to open the door.

Multifunctional device (MFD)

Combines the functions of a printer, copier, scanner, and fax machine.

passive

Computer displays are often considered _______ peripherals.

Application blacklisting

Creating a list of applications that are denied to run.

Application whitelisting

Creating a list of applications that are permitted to run.

Baselining

Creating a starting point for comparison purposes to apply targets and goals to measure success.

Code signing

Digitally signing applications.

Data exposure

Disclosing sensitive data to attackers.

Immutable systems

Ensuring that once a value or configuration is employed as part of an application, it is not modified.

Continuous integration

Ensuring that security features are incorporated at each stage of application development.

Basic Input/Output System (BIOS)

Firmware that wakens and tests the various components of the computer upon startup.

Patch Tuesday

For several years, Microsoft delivered security patches only on the second Tuesday of the month, known as _____________.

dynamic analysis

Heuristic monitoring, or _______________, uses techniques to identify characteristics of a virus instead of matching a virus signature.

A. Using the security mechanisms on a standard Wi-Fi network.

How can an SDIO card be made secure? A. Using the security mechanisms on a standard Wi-Fi network. B. Turning on patch updates to the SDIO card. C. Requiring a username before accessing the SDIO card. D. SDIO cards are natively secure and no security settings are needed.

C. The bytes of a virus are placed in different "piles" and then used to create a profile.

How does heuristic detection detect a virus? A. A virtualized environment is created and the code is executed in it. B. A string of bytes from the virus is compared against the suspected file. C. The bytes of a virus are placed in different "piles" and then used to create a profile. D. The virus signature file is placed in a suspended chamber before streaming to the CPU.

Lighting

Illuminating an area so that it can be viewed after dark.

Roller barrier

Independently rotating large cups (diameter of 5 inches or 115 millimeters) affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it.

Client-side execution and validation

Input validation that is performed by the user's web browser.

Server-side execution and validation

Input validation that uses the server to perform the validation.

Runtime code testing.

Looking for errors after the program has compiled correctly and is running, such as a pointer deference or memory leak.

Infrastructure as code

Managing a hardware and software infrastructure using the same principles as developing computer code.

4,000 50,000,000

Microsoft's first operating system, MS-DOS v1.0, had ____ lines of code, while Windows 10 is estimated to have up to ________ lines.

Mail gateway

Monitors emails for spam and other unwanted content to prevent these messages from being delivered.

Appliance OS

OS in firmware that is designed to manage a specific device like a digital video recorder or video game console.

Mobile OS

Operating system for cell phones, smartphones, tablets, and other handheld devices

Server OS

Operating system software that runs on a network server to provide resources to network users.

Normalization

Organizing data within a database to minimize redundancy.

whitelisting

Permitting only specifically designated applications to run on an OS is known as _____.

Key management

Procedures to regulate the distribution of door keys.

Electromagnetic spying

Process of picking up electromagnetic fields emitted by computers, printers, and other digital devices and then reading the data that is producing them.

Feature update

Provides enhancements to the software to provide new or expanded functionality, but does not address security vulnerability.

Stress testing

Putting an application under a heavier than normal load to determine if the program is robust and can perform all error handling correctly.

Deprovisioning

Removing a resource that is no longer needed.

deprovisioning

Removing a resource that is no longer used is known as ____________.

Wildcard scanning

Scanning process in which it is allowed to skip bytes or ranges of bytes instead of looking for an exact match.

String scanning

Scanning process that attempts to match known virus patterns against potentially infected files.

Mismatch scanning

Scanning process which allows a set number of bytes in the string to be any value regardless of their position in the string

Compiled code testing

Searching for errors that could prevent an application from properly compiling from source code to application code.

Elite Tailored Access Operations (TAO)

Section of the NSA responsible for compromising networks owned by hostile nations to spy on them.

Dynamic analysis

Software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.

Version control

Software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.

Antivirus (AV)

Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.

Workstation OS

Software that manages hardware and software on a client computer.

Network OS

Software that runs on a network device like a firewall, router, or switch.

OpenFirmware

Something used by early Apple computers that performed a similar function to BIOS.

Kiosk OS

System and user interface software for an interactive customer device.

Proper error handling

Taking the correct steps when an error occurs so that the application does not abort unexpectedly.

Power on Self Test (POST)

Test performed by BIOS on startup to ensure full functionality.

Secure DevOps

The _____________ methodology includes security automation, continuous integration, immutable systems, infrastructure as code, and baselining.

Motion detection

The ability to determine an object's change in position in relation to its surroundings.

Air gap

The absence of any type of connection between areas.

Provisioning

The enterprise-wide configuration, deployment, and management of multiple types of IT system resources.

Hardware root of trust

The hardware starting point in a chain of trust.

Booting (or booting up)

The process of a computer starting up by itself.

OS hardening

The process of tightening security during the design and coding of an operating system.

Chain of trust

The process of validating elements/signatures by UEFI and Secure Boot during the boot sequence.

Integer overflow

The result of an arithmetic operation like addition or multiplication exceeds the maximum size of the integer type used to store it.

Static program analyzers

Tools that examine software without actually executing the program; instead, the source code is reviewed and analyzed.

Security automation

Tools that test for vulnerabilities automatically.

Patch management tools

Tools used to manage security fixes.

False

True or False. A proven method for securing documents, files, and data is automatic synchronization with a cloud-based repository.

False

True or False. Because of potential vulnerabilities, it is recommended that SDKs not be used when developing new applications.

True

True or False? A BIOS attack does not take advantage of a vulnerability on the computer but exploits only the update feature of the BIOS.

False. The BIOS settings were not lost but instead were reset to their default settings.

True or False? In the event that CMOS is shutdown due to battery failure, all BIOS setting would be lost.

True

True or False? Smart MFDs have an OS that allows additional applications to be installed that extend the abilities of the MFD.

True

True or False? The exact details of Tempest are secret, but we do know they use special protective coatings on cables and shielding in buildings to prevent electromagnetic fields from being at a detectable level from outside.

False. It can be difficult or sometimes impossible to clean when planted in the ROM firmware.

True or False? if the malware is planted in the ROM firmware of the device, it can be difficult, but generally less so than typical malware to clean on an infected device.

Disabling unnecessary ports and services

Turning off any service that is not being used.

Disabling default accounts/passwords

Turning off unnecessary default accounts and passwords.

Flash

Type of memory used by mobile devices.

Forced updates

Updates that cannot be refused or delayed.

Code reuse of third-party libraries and SDKs

Using existing software or software development kits (SDKs) in a new application.

video surveillance cameras

Video camera used to monitor activity; captured images can be sent to closed circuit TV (CCTV) monitored by a human or recorded for later examination.

C. Group Policy

What allows for a single configuration to be set and then deployed to many or all users? A. Snap-In Replication (SIR) B. Active Directory C. Group Policy D. Command Configuration

Standard-Capacity (SDSC) High-Capcity (SDHC) eXtended-Capacity (SDXC) Secure Digital Input Output (SDIO)

What are the four families of SD card?

Do Not Duplicate Manufacturer's serial numbers

What should be marked on and removed from any master keys that are created?

Lithium-ion battery 10 years

What was used to provide dedicated power to CMOS and how long could it hold a charge?

Process spawning control

When a threat actor tricks the vulnerable application into spawning executable files on the system.

System tampering

When a threat actor uses a vulnerable application to modify special sensitive areas of the operating system and take advantage of those modifications.

Code emulation

When a virtual environment is created that simulates the CPU and memory of the computer.

No selective updates

When users cannot select individual Windows updates to download and install.

A. Waterfall model

Which model uses a sequential design process? A. Waterfall model B. Rigid model C. Agile model D. Secure model

B. Cable lock

Which of the following can be used to secure a laptop or mobile device? A. Mobile connector B. Cable lock C. Mobile chain D. Security tab

A. Requires periodic visual inspections

Which of the following is NOT a characteristic of an alarmed carrier PDS? A. Requires periodic visual inspections B. Uses continuous monitoring C. Carrier can be hidden above the ceiling D. Eliminates the need to seal connections

D. Variable overflow

Which of the following is NOT a memory vulnerability? A. DLL injection B. Pointer deference C. Buffer overflow D. Variable overflow

C. Moisture

Which of the following is NOT a motion detection method? A. Magnetism B. Radio frequency C. Moisture D. Infrared

D. Supply chains take advantage of the trusted "chain of trust" concept.

Which of the following is NOT a reason why supply chain infections are considered especially dangerous? A. If the malware is planted in the ROM firmware of the device this can make it difficult or sometimes even impossible to clean an infected device. B. Users are receiving infected devices at the point of purchase and are completely unaware that a brand new device may be infected. C. It is virtually impossible to closely monitor every step in the supply chain. D. Supply chains take advantage of the trusted "chain of trust" concept.

B. Restricting patch management

Which of the following is NOT a typical OS security configuration? A. Employing least functionality B. Restricting patch management C. Disabling default accounts/passwords D. Disabling unnecessary ports and services

C. Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.

Which of the following is NOT an advantage to an automated patch update service? A. Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs. B. Downloading patches from a local server instead of using the vendor's online update service can save bandwidth and time because each computer does not have to connect to an external server. C. Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service. D. Specific types of updates that the organization does not test, such as hotfixes, can be automatically installed whenever they become available.

A. Barricade

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow? A. Barricade B. Fencing C. Roller barrier D. Type V controls

B. Service pack

Which of the following is a cumulative package of all patches? A. Rollup B. Service pack C. Patch D. Hotfix

C. Model validation

Which of the following is not used to test application code? A. Stress testing B. Fuzzing C. Model validation D. Static program analysis

B. Dynamic analysis

Which of the following types of testing uses unexpected or invalid inputs? A. Stress testing B. Dynamic analysis C. Static analysis D. Runtime testing

B. Whitelist

Which of these is a list of approved email senders? A. Blacklist B. Whitelist C. Bluelist D. Yellowlist

C. Staging stage

Which stage is a "quality assurance" test that verifies the code functions as intended? A. Production stage B. Testing stage C. Staging stage D. Development stage

B. It monitors and controls two interlocking doors to a room.

Which statement about a mantrap is true? A. It is illegal in the United States. B. It monitors and controls two interlocking doors to a room. C. It is a special keyed lock. D. It requires the use of a cipher lock.

B. Network OS

Which type of operating system runs on a firewall, router, or switch? A. Server OS B. Network OS C. Device OS D. Resource OS

B. Keyed entry lock

Which type of residential lock is most often used for keeping out intruders? A. Encrypted key lock B. Keyed entry lock C. Privacy lock D. Passage lock

Windows 10

With which operating system did Microsoft stop doing patches only on the second Tuesday of the month?

Obfuscation/camouflaged code

Writing an application in such a way that its inner functionality is difficult for an outsider to understand.

microSD miniSD

_______ and _______memory cards are commonly used in smaller electronic devices like smartphones, digital cameras, and tablets.

Full SD

_______ memory cards are typically used in large consumer electronics devices.


Related study sets

CT Module 1, CT Module 3, CT Module 4, CT Module 5, CT Module 6, CT Module 7, CT Module 9, CT Module 10, CT Module 11, CT Module 12

View Set

Test 4 Pharm: Drugs Acting On Central, Peripheral, and Autonomic Nervous System

View Set

Goodin (Permissible Paternalism)

View Set

Western Civilization Final Ques.

View Set

System Security Management Quiz 9

View Set

Exam 3 Chp 15.16.17.18.20.21.22.23

View Set

Architecture Lecture Midterm/Quizes

View Set

MKT210 Marketing Chapter 6 Video : Eaton

View Set