SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI layer responsible for end-to-end connections and reliability (i.e. TCP
XSS
misconfigured mail server
transport
network
2. OSI layer responsible for network processes to application
cookie poisoning
cookie attacks
application
cookies
3. Can leave the sandbox and obtain access to client resources
digitally signed java control
session cookie
cookie poisoning
ActiveX
4. An attack that occurs when malicious code is injected into a web site - where it is downloaded and executed by other users
threat modeling
P2P
reflected and stored
XSS
5. Security zone options offered by Internet Explorer
peer to peer
network
application gateways
Internet - Local Intranet - Trusted Sites - Restricted Sites
6. Cause of open SMTP relays
Application - Presentation - Session - Transport - Network - Data Link - Physical
misconfigured mail server
Internet - Local Intranet - Trusted Sites - Restricted Sites
stack
7. COTS stands for
cookie hijacking
buffer overflow
common off the shelf
peer to peer
8. Protocols used in this layer (ARP
P2P
peer to peer
application
data link
9. Process to identify and assess a system's security risks
security objective definition - application review - application decomposition - threat identification - vulnerability identification
cross-site scripting
input validation criteria
threat modeling
10. OSI layer that establishes - manages and terminates the connections between the local and remote application
threat identification
XSS
session
tracking cookie
11. OSI layer responsible for data representation and encryption (MIME
cookie hijacking
threat modeling
data link
presentation
12. A microsoft created technology that enables software applications to share and reuse software components - maybe used to access files on local system or system registry
reflected XSS
session
ActiveX
cookie leaking
13. OSI layer that provides interhost communication (Named Pipes
transport
application
session
cookie hijacking
14. Categories of XSS
reflected and stored
security objective definition
reflected XSS
application gateways
15. A method of code signing - allows developers to obtain digital certificate generated by a certificate authority and digitally sign ActiveX controls
data link
P2P
authenticode
presentation
16. OSI model layers
buffer overflow
XSS attacks
Application - Presentation - Session - Transport - Network - Data Link - Physical
threat identification
17. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
security objective definition - application review - application decomposition - threat identification - vulnerability identification
application
P2P
data link
18. OSI layer that provides the means to transfer data between network entities and detect/correct errors that may occur in the physical layer
presentation
misconfigured mail server
network
data link
19. Server misused to forward spam - DoS conditions - damage to brand - blacklist on spam sites are risks associated with
open mail relay
threat identification
cookies
application gateways
20. OSI layer defines the electrical / physical device specs (media - signal - and binary transmission). This includes the layout of pins - voltages - cable specifications - hubs - network adapters - host bus adapters and more.
session
physical
cookie attacks
persistent cookie
21. Enable the cookie secure-bit setting - avoid using cookies to hold sensitive data - block third-party cookies will prevent ______
drive by download
application
cookie attacks
reflected and stored
22. Can filter out most buffer overflow attacks
data link
application gateways
bytecode verifier
network
23. Phase of threat modeling that reviews application ingress and egress data flow and trust boundaries
physical
tracking cookie
application decomposition
peer to peer
24. OSI layer responsible for path determination and logical addressing - routers operate at this layer
network
digitally signed java control
persistent cookie
packet sniffer
25. Type - length - format - range
input validation criteria
java
cookie poisoning
security objective definition
26. Malicious code stored in a web application that is downloaded and executed without the user's knowledge
vulnerability identification
stored XSS
tracking cookie
heap
27. Protocols in this layer NNTP
application
ARP spoofing
transport
tracking cookie
28. Used by java and javascript to isolate executing code in a reserved area of memory to limit damage of malicious code
IM
session - persistent - tracking
sandboxing
XSS
29. Sensitive information stored within a cookie that is obtained by unauthorized users
network
P2P
data link
cookie leaking
30. OSI layer that provides transparent transfer of data between end users
transport
IM
Application - Presentation - Session - Transport - Network - Data Link - Physical
threat identification
31. Have a timeout value - are not deleted when the user closes their web brower - used to store user preferences and information about the use connection
presentation
persistent cookie
peer to peer
tracking cookie
32. Each client is a peer and serves each other client on the network - requires client application and appropriate open network ports to operate
peer to peer
zones
data link
input validation
33. Used by java to verify the code for a list of predetermined insecurities
tracking cookie
bytecode verifier
security objective definition
stored XSS
34. Enticing a user to execute malicious code stored on a web server (i.e. via hyperlink in an email)
reflected XSS
sandboxing
application review
threat identification
35. OSI layer attributed with 75% of malicious attacks
cookies
presentation
physical
application
36. Area of the memory where dynamically allocated variables are stored
heap
zones
cross-site scripting
address resolution protocol
37. Number one safeguard against buffer overflow - XSS - data injection - and DoS attacks
XSS
digitally signed java control
threat modeling
input validation
38. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
presentation
P2P
application review
XSS attacks
39. This layer formats and encrypts data to be sent across a network - providing freedom from compatibility problems - sometimes called the syntax layer
threat identification
stack
IM
presentation
40. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
vulnerability identification
bytecode verifier
cookie poisoning
buffer overflow
41. More data is put into a buffer than it was designed to hold - can be caused deliberately by hackers to run malicious code
data link
buffer overflow
vulnerability identification
threat modeling
42. IP address exposure - download of worm/viruses circumventing the firewall - no way to track improper communication - messages in clear text are risks associated with
persistent cookie
Application - Presentation - Session - Transport - Network - Data Link - Physical
IM
bytecode verifier
43. The unauthorized modification of the data stored within a cookie
XSS attacks
data link
cookie poisoning
transport
44. XSS stands for
physical
data link
threat modeling
cross-site scripting
45. Used to record user's web activity - may be downloaded in the background
sandboxing
tracking cookie
digitally signed java control
cross-site scripting
46. Phases of threat modeling
input validation
security objective definition - application review - application decomposition - threat identification - vulnerability identification
cookie poisoning
javascript
47. Three main cookie types
session - persistent - tracking
packet sniffer
security objective definition
input validation
48. ARP stands for...
physical
address resolution protocol
application
data link
49. Two types of buffer overflows
peer to peer
bytecode verifier
XSS attacks
stack and heap
50. Attack that occurs when a user navigates to a web site and hostile content is automatically downloaded and executed
buffer overflow
drive by download
cookie hijacking
reflected and stored