SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI layer responsible for network processes to application
security objective definition
misconfigured mail server
zones
application
2. OSI layer that relates to the physical connection of two devices (i.e. RS-232
open mail relay
buffer overflow
physical
drive by download
3. Scripting languages - developed by Microsoft to allow developers to extend and reuse web functionality
common off the shelf
vbscript and jscript
address resolution protocol
bytecode verifier
4. OSI layer that provides transparent transfer of data between end users
authenticode
transport
data link
session
5. Categories of XSS
application decomposition
peer to peer
reflected and stored
P2P
6. Enable the cookie secure-bit setting - avoid using cookies to hold sensitive data - block third-party cookies will prevent ______
heap
reflected and stored
session
cookie attacks
7. Can filter out most buffer overflow attacks
application gateways
Internet - Local Intranet - Trusted Sites - Restricted Sites
network
application
8. A named collection of Web sites that can be assigned a specific security level
zones
address resolution protocol
common off the shelf
transport
9. Sensitive information stored within a cookie that is obtained by unauthorized users
cookie leaking
address resolution protocol
data link
application gateways
10. A microsoft created technology that enables software applications to share and reuse software components - maybe used to access files on local system or system registry
threat identification
ActiveX
open mail relay
IM
11. OSI layer that provides the means to transfer data between network entities and detect/correct errors that may occur in the physical layer
authenticode
network
IM
data link
12. Can leave the sandbox and obtain access to client resources
P2P
digitally signed java control
physical
presentation
13. The unauthorized modification of the data stored within a cookie
cookie poisoning
security objective definition
vbscript and jscript
vulnerability identification
14. Cause of open SMTP relays
security objective definition - application review - application decomposition - threat identification - vulnerability identification
stored XSS
misconfigured mail server
cookie leaking
15. More data is put into a buffer than it was designed to hold - can be caused deliberately by hackers to run malicious code
application gateways
buffer overflow
digitally signed java control
drive by download
16. This layer formats and encrypts data to be sent across a network - providing freedom from compatibility problems - sometimes called the syntax layer
presentation
authenticode
stack
tracking cookie
17. A programming language - developed by Sun - used to make small applications (applets) for the Internet and stand alone programs
physical
peer to peer
zones
java
18. Three main cookie types
sandboxing
session - persistent - tracking
cookie poisoning
peer to peer
19. Ensure data input is validated - encode user supplied data - don't click on unknown hyperlinks - implement restrictive web browser security zones are preventative measures against
stored XSS
XSS attacks
presentation
open mail relay
20. Attackers sniff network traffic and capture a cookie download or gain access to a computer and view locally stored cookie
java
cookie leaking
application
cookie hijacking
21. OSI layer responsible for end-to-end connections and reliability (i.e. TCP
application decomposition
buffer overflow
IM
transport
22. Two types of buffer overflows
buffer overflow
vulnerability identification
open mail relay
stack and heap
23. OSI layer defines the electrical / physical device specs (media - signal - and binary transmission). This includes the layout of pins - voltages - cable specifications - hubs - network adapters - host bus adapters and more.
tracking cookie
Application - Presentation - Session - Transport - Network - Data Link - Physical
data link
physical
24. Have a timeout value - are not deleted when the user closes their web brower - used to store user preferences and information about the use connection
threat identification
persistent cookie
reflected and stored
packet sniffer
25. OSI layer 2 - verify the connection between two devices is intact (i.e. physical addressing)
open mail relay
buffer overflow
data link
cross-site scripting
26. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
P2P
sandboxing
ARP spoofing
heap
27. Protocols used in this layer - IP
network
XSS attacks
cookie attacks
sandboxing
28. Server misused to forward spam - DoS conditions - damage to brand - blacklist on spam sites are risks associated with
open mail relay
persistent cookie
application
sandboxing
29. IP address exposure - download of worm/viruses circumventing the firewall - no way to track improper communication - messages in clear text are risks associated with
IM
XSS
session
application
30. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
P2P
input validation
heap
javascript
31. A scripting language - developed by Netscape to perform client-side web development
input validation criteria
stack
javascript
peer to peer
32. OSI layer that establishes - manages and terminates the connections between the local and remote application
Application - Presentation - Session - Transport - Network - Data Link - Physical
threat identification
application
session
33. Phases of threat modeling
security objective definition - application review - application decomposition - threat identification - vulnerability identification
session
packet sniffer
bytecode verifier
34. Protocols in this layer NNTP
application
session - persistent - tracking
session
network
35. OSI layer that provides interhost communication (Named Pipes
data link
session
threat identification
sandboxing
36. Attack that occurs when a user navigates to a web site and hostile content is automatically downloaded and executed
cookie attacks
threat modeling
Internet - Local Intranet - Trusted Sites - Restricted Sites
drive by download
37. Allow an attacker to intercept and modifiy data sent between two network devices - hijacking of network communications - attacks data link layer
ARP spoofing
P2P
digitally signed java control
data link
38. Process to identify and assess a system's security risks
threat modeling
application gateways
authenticode
address resolution protocol
39. Used to record user's web activity - may be downloaded in the background
application
IM
P2P
tracking cookie
40. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
drive by download
vulnerability identification
persistent cookie
application
41. Small text files downloaded and stored on a user's computer that contain information about the user's session and preferences
application layer
cookies
security objective definition - application review - application decomposition - threat identification - vulnerability identification
bytecode verifier
42. Protocols used in this layer (ARP
data link
javascript
cross-site scripting
network
43. OSI model layers
input validation
Application - Presentation - Session - Transport - Network - Data Link - Physical
persistent cookie
presentation
44. Security zone options offered by Internet Explorer
XSS attacks
reflected XSS
address resolution protocol
Internet - Local Intranet - Trusted Sites - Restricted Sites
45. ARP stands for...
misconfigured mail server
address resolution protocol
cookies
presentation
46. Security objectives placed on an application are identified - controlling the scope of the threat modeling process
session - persistent - tracking
security objective definition
sandboxing
authenticode
47. Area of the memory where function calls are stored
stack
application
P2P
drive by download
48. Phase of threat modeling that reviews application ingress and egress data flow and trust boundaries
P2P
transport
misconfigured mail server
application decomposition
49. Used by java to verify the code for a list of predetermined insecurities
transport
data link
bytecode verifier
cookie hijacking
50. Type - length - format - range
buffer overflow
heap
input validation criteria
drive by download