SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A scripting language - developed by Netscape to perform client-side web development
javascript
digitally signed java control
vbscript and jscript
P2P
2. COTS stands for
input validation criteria
common off the shelf
threat modeling
presentation
3. Used by java and javascript to isolate executing code in a reserved area of memory to limit damage of malicious code
sandboxing
open mail relay
peer to peer
session
4. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
P2P
Internet - Local Intranet - Trusted Sites - Restricted Sites
ActiveX
physical
5. Used by java to verify the code for a list of predetermined insecurities
network
cross-site scripting
input validation criteria
bytecode verifier
6. OSI layer responsible for network processes to application
cross-site scripting
application
IM
open mail relay
7. Number one safeguard against buffer overflow - XSS - data injection - and DoS attacks
persistent cookie
peer to peer
session - persistent - tracking
input validation
8. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
digitally signed java control
cross-site scripting
stack and heap
P2P
9. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
vulnerability identification
stack
reflected and stored
open mail relay
10. Tools used to capture packets of data off a network and allow viewing of contents
threat identification
packet sniffer
physical
data link
11. Key functionality (how the application works) is identified and an application diagram developed in this phase of threat modeling
application review
network
reflected XSS
security objective definition
12. Can filter out most buffer overflow attacks
application gateways
session - persistent - tracking
stored XSS
XSS
13. Phase of threat modeling that reviews application ingress and egress data flow and trust boundaries
security objective definition
vbscript and jscript
XSS attacks
application decomposition
14. Can leave the sandbox and obtain access to client resources
digitally signed java control
drive by download
ARP spoofing
XSS
15. This layer formats and encrypts data to be sent across a network - providing freedom from compatibility problems - sometimes called the syntax layer
zones
vulnerability identification
application
presentation
16. A method of code signing - allows developers to obtain digital certificate generated by a certificate authority and digitally sign ActiveX controls
authenticode
sandboxing
cookies
stored XSS
17. OSI layer that relates to the physical connection of two devices (i.e. RS-232
physical
security objective definition - application review - application decomposition - threat identification - vulnerability identification
java
application
18. Enticing a user to execute malicious code stored on a web server (i.e. via hyperlink in an email)
reflected XSS
javascript
stack
cookie poisoning
19. Scripting languages - developed by Microsoft to allow developers to extend and reuse web functionality
peer to peer
cookie hijacking
session
vbscript and jscript
20. Attacks targeting buffer overflow and cross-site scripting attack this OSI layer
application review
transport
application decomposition
application layer
21. OSI layer responsible for end-to-end connections and reliability (i.e. TCP
javascript
drive by download
transport
stored XSS
22. More data is put into a buffer than it was designed to hold - can be caused deliberately by hackers to run malicious code
peer to peer
session
stack
buffer overflow
23. Sensitive information stored within a cookie that is obtained by unauthorized users
peer to peer
cookie leaking
vbscript and jscript
transport
24. A programming language - developed by Sun - used to make small applications (applets) for the Internet and stand alone programs
java
sandboxing
input validation criteria
transport
25. OSI model layers
Application - Presentation - Session - Transport - Network - Data Link - Physical
packet sniffer
ActiveX
open mail relay
26. OSI layer responsible for data representation and encryption (MIME
threat identification
presentation
data link
session cookie
27. Each client is a peer and serves each other client on the network - requires client application and appropriate open network ports to operate
peer to peer
drive by download
transport
application
28. Cause of open SMTP relays
physical
misconfigured mail server
presentation
javascript
29. Three main cookie types
session - persistent - tracking
presentation
zones
buffer overflow
30. Small text files downloaded and stored on a user's computer that contain information about the user's session and preferences
Application - Presentation - Session - Transport - Network - Data Link - Physical
cookies
application
threat modeling
31. ARP stands for...
vulnerability identification
address resolution protocol
ARP spoofing
data link
32. XSS stands for
vulnerability identification
cross-site scripting
presentation
application
33. A microsoft created technology that enables software applications to share and reuse software components - maybe used to access files on local system or system registry
vulnerability identification
ActiveX
Internet - Local Intranet - Trusted Sites - Restricted Sites
ARP spoofing
34. OSI layer that provides the means to transfer data between network entities and detect/correct errors that may occur in the physical layer
P2P
vbscript and jscript
data link
buffer overflow
35. OSI layer that provides transparent transfer of data between end users
network
stack and heap
physical
transport
36. Area of the memory where function calls are stored
data link
sandboxing
stack
java
37. Threats to defined security objects are identified using knowledge gained during application decomposition in this phase of threat modeling
threat identification
threat modeling
application
application layer
38. Security zone options offered by Internet Explorer
Internet - Local Intranet - Trusted Sites - Restricted Sites
drive by download
stack and heap
cookie hijacking
39. Ensure data input is validated - encode user supplied data - don't click on unknown hyperlinks - implement restrictive web browser security zones are preventative measures against
javascript
XSS attacks
security objective definition
transport
40. The unauthorized modification of the data stored within a cookie
Application - Presentation - Session - Transport - Network - Data Link - Physical
open mail relay
cookie poisoning
data link
41. OSI layer 2 - verify the connection between two devices is intact (i.e. physical addressing)
application gateways
buffer overflow
application
data link
42. Protocols in this layer NNTP
application
network
application decomposition
digitally signed java control
43. Protocols used in this layer (ARP
P2P
data link
transport
Application - Presentation - Session - Transport - Network - Data Link - Physical
44. An attack that occurs when malicious code is injected into a web site - where it is downloaded and executed by other users
cookie attacks
XSS
cookies
session cookie
45. Have a timeout value - are not deleted when the user closes their web brower - used to store user preferences and information about the use connection
javascript
presentation
peer to peer
persistent cookie
46. Server misused to forward spam - DoS conditions - damage to brand - blacklist on spam sites are risks associated with
transport
open mail relay
reflected and stored
session
47. Protocols used in this layer - IP
threat modeling
network
security objective definition - application review - application decomposition - threat identification - vulnerability identification
ActiveX
48. OSI layer that provides interhost communication (Named Pipes
cookie poisoning
data link
session
network
49. Attack that occurs when a user navigates to a web site and hostile content is automatically downloaded and executed
common off the shelf
drive by download
physical
Application - Presentation - Session - Transport - Network - Data Link - Physical
50. OSI layer responsible for path determination and logical addressing - routers operate at this layer
network
threat identification
application
reflected XSS