SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used by java to verify the code for a list of predetermined insecurities
cookie leaking
bytecode verifier
transport
peer to peer
2. A named collection of Web sites that can be assigned a specific security level
zones
address resolution protocol
cookie poisoning
cookie attacks
3. OSI layer responsible for path determination and logical addressing - routers operate at this layer
application
vulnerability identification
threat identification
network
4. Area of the memory where function calls are stored
tracking cookie
open mail relay
application decomposition
stack
5. Protocols used in this layer (ARP
cookie hijacking
physical
javascript
data link
6. Phase of threat modeling that reviews application ingress and egress data flow and trust boundaries
bytecode verifier
transport
open mail relay
application decomposition
7. OSI layer that provides the means to transfer data between network entities and detect/correct errors that may occur in the physical layer
data link
session
security objective definition - application review - application decomposition - threat identification - vulnerability identification
input validation
8. The unauthorized modification of the data stored within a cookie
cookie poisoning
application review
P2P
data link
9. P2P stands for...
network
data link
security objective definition - application review - application decomposition - threat identification - vulnerability identification
peer to peer
10. Allow an attacker to intercept and modifiy data sent between two network devices - hijacking of network communications - attacks data link layer
ARP spoofing
physical
presentation
application layer
11. OSI layer that provides interhost communication (Named Pipes
cookie hijacking
sandboxing
session
peer to peer
12. OSI model layers
application
transport
Application - Presentation - Session - Transport - Network - Data Link - Physical
application
13. Three main cookie types
reflected XSS
session
data link
session - persistent - tracking
14. Protocols in this layer NNTP
peer to peer
application
java
application review
15. XSS stands for
persistent cookie
cross-site scripting
cookie leaking
presentation
16. Used by java and javascript to isolate executing code in a reserved area of memory to limit damage of malicious code
application
sandboxing
physical
security objective definition - application review - application decomposition - threat identification - vulnerability identification
17. Ensure data input is validated - encode user supplied data - don't click on unknown hyperlinks - implement restrictive web browser security zones are preventative measures against
session cookie
XSS attacks
cross-site scripting
network
18. Categories of XSS
security objective definition
buffer overflow
reflected and stored
stack
19. Process to identify and assess a system's security risks
threat modeling
application layer
application
heap
20. Small text files downloaded and stored on a user's computer that contain information about the user's session and preferences
application layer
cookies
input validation
session - persistent - tracking
21. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
session - persistent - tracking
Application - Presentation - Session - Transport - Network - Data Link - Physical
P2P
threat modeling
22. OSI layer attributed with 75% of malicious attacks
cookie leaking
threat identification
Internet - Local Intranet - Trusted Sites - Restricted Sites
application
23. Have a timeout value - are not deleted when the user closes their web brower - used to store user preferences and information about the use connection
persistent cookie
drive by download
stored XSS
cookie hijacking
24. OSI layer that provides transparent transfer of data between end users
tracking cookie
packet sniffer
transport
application decomposition
25. Attacks targeting buffer overflow and cross-site scripting attack this OSI layer
address resolution protocol
application layer
session
reflected XSS
26. A microsoft created technology that enables software applications to share and reuse software components - maybe used to access files on local system or system registry
misconfigured mail server
ActiveX
cookies
vulnerability identification
27. Can leave the sandbox and obtain access to client resources
cookie leaking
peer to peer
stack and heap
digitally signed java control
28. Scripting languages - developed by Microsoft to allow developers to extend and reuse web functionality
vbscript and jscript
data link
ARP spoofing
cookie hijacking
29. ARP stands for...
physical
address resolution protocol
cookie attacks
buffer overflow
30. OSI layer that relates to the physical connection of two devices (i.e. RS-232
physical
misconfigured mail server
common off the shelf
XSS
31. A method of code signing - allows developers to obtain digital certificate generated by a certificate authority and digitally sign ActiveX controls
physical
authenticode
network
open mail relay
32. OSI layer defines the electrical / physical device specs (media - signal - and binary transmission). This includes the layout of pins - voltages - cable specifications - hubs - network adapters - host bus adapters and more.
stack
peer to peer
physical
network
33. Key functionality (how the application works) is identified and an application diagram developed in this phase of threat modeling
common off the shelf
cookie attacks
application review
session cookie
34. Enable the cookie secure-bit setting - avoid using cookies to hold sensitive data - block third-party cookies will prevent ______
data link
session
cookie attacks
session - persistent - tracking
35. Enticing a user to execute malicious code stored on a web server (i.e. via hyperlink in an email)
reflected XSS
transport
cookie leaking
data link
36. Cause of open SMTP relays
presentation
misconfigured mail server
peer to peer
open mail relay
37. An attack that occurs when malicious code is injected into a web site - where it is downloaded and executed by other users
application
XSS
data link
bytecode verifier
38. Type - length - format - range
input validation criteria
java
session - persistent - tracking
data link
39. COTS stands for
transport
threat identification
common off the shelf
cookie poisoning
40. Each client is a peer and serves each other client on the network - requires client application and appropriate open network ports to operate
application review
peer to peer
physical
threat modeling
41. OSI layer responsible for network processes to application
session cookie
network
data link
application
42. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
threat identification
network
zones
P2P
43. OSI layer that establishes - manages and terminates the connections between the local and remote application
IM
P2P
session
application review
44. A programming language - developed by Sun - used to make small applications (applets) for the Internet and stand alone programs
digitally signed java control
java
packet sniffer
javascript
45. Phases of threat modeling
security objective definition - application review - application decomposition - threat identification - vulnerability identification
heap
ActiveX
persistent cookie
46. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
vulnerability identification
session
security objective definition
application
47. Security objectives placed on an application are identified - controlling the scope of the threat modeling process
javascript
security objective definition
session - persistent - tracking
input validation
48. OSI layer 2 - verify the connection between two devices is intact (i.e. physical addressing)
data link
java
transport
XSS
49. Two types of buffer overflows
stack and heap
application
threat modeling
cookie attacks
50. Malicious code stored in a web application that is downloaded and executed without the user's knowledge
stored XSS
threat modeling
reflected and stored
session
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests