SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI layer responsible for path determination and logical addressing - routers operate at this layer
transport
misconfigured mail server
network
application gateways
2. OSI layer that relates to the physical connection of two devices (i.e. RS-232
security objective definition
physical
application gateways
tracking cookie
3. Process to identify and assess a system's security risks
cookie poisoning
threat modeling
physical
session
4. Can leave the sandbox and obtain access to client resources
presentation
Application - Presentation - Session - Transport - Network - Data Link - Physical
stack and heap
digitally signed java control
5. Attacks targeting buffer overflow and cross-site scripting attack this OSI layer
IM
cross-site scripting
application layer
presentation
6. Protocols used in this layer - IP
data link
network
data link
vulnerability identification
7. A programming language - developed by Sun - used to make small applications (applets) for the Internet and stand alone programs
session cookie
application review
P2P
java
8. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
input validation criteria
application layer
P2P
session cookie
9. Malicious code stored in a web application that is downloaded and executed without the user's knowledge
packet sniffer
stored XSS
cookie poisoning
sandboxing
10. A microsoft created technology that enables software applications to share and reuse software components - maybe used to access files on local system or system registry
bytecode verifier
application
XSS attacks
ActiveX
11. A method of code signing - allows developers to obtain digital certificate generated by a certificate authority and digitally sign ActiveX controls
presentation
authenticode
drive by download
cookie leaking
12. Used to record user's web activity - may be downloaded in the background
XSS
data link
tracking cookie
data link
13. OSI model layers
cookie hijacking
session cookie
Application - Presentation - Session - Transport - Network - Data Link - Physical
vbscript and jscript
14. A scripting language - developed by Netscape to perform client-side web development
open mail relay
packet sniffer
javascript
application review
15. The unauthorized modification of the data stored within a cookie
ARP spoofing
stack
cookie poisoning
session
16. Security zone options offered by Internet Explorer
ActiveX
bytecode verifier
persistent cookie
Internet - Local Intranet - Trusted Sites - Restricted Sites
17. Small text files downloaded and stored on a user's computer that contain information about the user's session and preferences
application
cross-site scripting
Application - Presentation - Session - Transport - Network - Data Link - Physical
cookies
18. Security objectives placed on an application are identified - controlling the scope of the threat modeling process
session
security objective definition
authenticode
open mail relay
19. Can filter out most buffer overflow attacks
application gateways
stored XSS
session cookie
Internet - Local Intranet - Trusted Sites - Restricted Sites
20. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
open mail relay
P2P
XSS attacks
application review
21. Server misused to forward spam - DoS conditions - damage to brand - blacklist on spam sites are risks associated with
IM
open mail relay
application
peer to peer
22. A named collection of Web sites that can be assigned a specific security level
peer to peer
cookie hijacking
java
zones
23. Enable the cookie secure-bit setting - avoid using cookies to hold sensitive data - block third-party cookies will prevent ______
persistent cookie
cookie attacks
XSS
cookie leaking
24. Two types of buffer overflows
session - persistent - tracking
stack and heap
Application - Presentation - Session - Transport - Network - Data Link - Physical
Internet - Local Intranet - Trusted Sites - Restricted Sites
25. Used by java to verify the code for a list of predetermined insecurities
data link
bytecode verifier
ARP spoofing
session
26. Enticing a user to execute malicious code stored on a web server (i.e. via hyperlink in an email)
reflected XSS
presentation
cookie leaking
digitally signed java control
27. Sensitive information stored within a cookie that is obtained by unauthorized users
security objective definition
transport
cookie leaking
java
28. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
vulnerability identification
application
network
application decomposition
29. Each client is a peer and serves each other client on the network - requires client application and appropriate open network ports to operate
input validation criteria
Internet - Local Intranet - Trusted Sites - Restricted Sites
reflected XSS
peer to peer
30. Number one safeguard against buffer overflow - XSS - data injection - and DoS attacks
security objective definition - application review - application decomposition - threat identification - vulnerability identification
reflected XSS
input validation
application layer
31. OSI layer that establishes - manages and terminates the connections between the local and remote application
ARP spoofing
session
application review
misconfigured mail server
32. Type - length - format - range
input validation criteria
peer to peer
tracking cookie
vbscript and jscript
33. OSI layer that provides interhost communication (Named Pipes
application gateways
data link
session
cookie poisoning
34. Tools used to capture packets of data off a network and allow viewing of contents
data link
P2P
data link
packet sniffer
35. ARP stands for...
session - persistent - tracking
bytecode verifier
address resolution protocol
reflected and stored
36. Allow an attacker to intercept and modifiy data sent between two network devices - hijacking of network communications - attacks data link layer
cookie leaking
peer to peer
ARP spoofing
input validation
37. Attackers sniff network traffic and capture a cookie download or gain access to a computer and view locally stored cookie
common off the shelf
cookie hijacking
XSS
packet sniffer
38. COTS stands for
tracking cookie
common off the shelf
input validation
Internet - Local Intranet - Trusted Sites - Restricted Sites
39. Phase of threat modeling that reviews application ingress and egress data flow and trust boundaries
application decomposition
physical
threat identification
session - persistent - tracking
40. Attack that occurs when a user navigates to a web site and hostile content is automatically downloaded and executed
physical
drive by download
XSS attacks
persistent cookie
41. P2P stands for...
security objective definition
peer to peer
cross-site scripting
java
42. XSS stands for
reflected XSS
cross-site scripting
data link
security objective definition - application review - application decomposition - threat identification - vulnerability identification
43. Categories of XSS
Application - Presentation - Session - Transport - Network - Data Link - Physical
threat identification
peer to peer
reflected and stored
44. OSI layer responsible for end-to-end connections and reliability (i.e. TCP
physical
application
misconfigured mail server
transport
45. Area of the memory where dynamically allocated variables are stored
heap
security objective definition - application review - application decomposition - threat identification - vulnerability identification
reflected XSS
application layer
46. Ensure data input is validated - encode user supplied data - don't click on unknown hyperlinks - implement restrictive web browser security zones are preventative measures against
XSS attacks
stack and heap
zones
XSS
47. Protocols used in this layer (ARP
physical
address resolution protocol
data link
P2P
48. More data is put into a buffer than it was designed to hold - can be caused deliberately by hackers to run malicious code
drive by download
buffer overflow
input validation
session
49. OSI layer that provides transparent transfer of data between end users
XSS
reflected and stored
common off the shelf
transport
50. Key functionality (how the application works) is identified and an application diagram developed in this phase of threat modeling
application review
P2P
P2P
application