SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security objectives placed on an application are identified - controlling the scope of the threat modeling process
physical
physical
security objective definition
session cookie
2. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
vulnerability identification
data link
javascript
session
3. Protocols in this layer NNTP
ActiveX
application
common off the shelf
stack
4. Three main cookie types
session
application
application
session - persistent - tracking
5. OSI layer that relates to the physical connection of two devices (i.e. RS-232
Application - Presentation - Session - Transport - Network - Data Link - Physical
physical
security objective definition
ARP spoofing
6. COTS stands for
peer to peer
authenticode
buffer overflow
common off the shelf
7. A microsoft created technology that enables software applications to share and reuse software components - maybe used to access files on local system or system registry
application gateways
common off the shelf
ActiveX
input validation
8. Can filter out most buffer overflow attacks
data link
application gateways
address resolution protocol
bytecode verifier
9. Sensitive information stored within a cookie that is obtained by unauthorized users
physical
cross-site scripting
address resolution protocol
cookie leaking
10. A programming language - developed by Sun - used to make small applications (applets) for the Internet and stand alone programs
XSS
peer to peer
java
cookies
11. Protocols used in this layer (ARP
reflected XSS
common off the shelf
heap
data link
12. Phase of threat modeling that reviews application ingress and egress data flow and trust boundaries
application decomposition
sandboxing
session cookie
session - persistent - tracking
13. Ensure data input is validated - encode user supplied data - don't click on unknown hyperlinks - implement restrictive web browser security zones are preventative measures against
XSS attacks
threat identification
peer to peer
transport
14. Malicious code stored in a web application that is downloaded and executed without the user's knowledge
session cookie
vulnerability identification
cookie attacks
stored XSS
15. Enable the cookie secure-bit setting - avoid using cookies to hold sensitive data - block third-party cookies will prevent ______
reflected XSS
P2P
cookie attacks
vulnerability identification
16. ARP stands for...
session - persistent - tracking
address resolution protocol
transport
ARP spoofing
17. Used by java and javascript to isolate executing code in a reserved area of memory to limit damage of malicious code
application layer
Internet - Local Intranet - Trusted Sites - Restricted Sites
session
sandboxing
18. Allow an attacker to intercept and modifiy data sent between two network devices - hijacking of network communications - attacks data link layer
stack and heap
javascript
ARP spoofing
zones
19. Attack that occurs when a user navigates to a web site and hostile content is automatically downloaded and executed
vbscript and jscript
drive by download
bytecode verifier
stack
20. This layer formats and encrypts data to be sent across a network - providing freedom from compatibility problems - sometimes called the syntax layer
ActiveX
Application - Presentation - Session - Transport - Network - Data Link - Physical
vulnerability identification
presentation
21. Used to record user's web activity - may be downloaded in the background
tracking cookie
data link
network
threat modeling
22. OSI layer attributed with 75% of malicious attacks
cookie leaking
application
network
persistent cookie
23. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
misconfigured mail server
application layer
tracking cookie
P2P
24. Deleted when the user closes their web browser - can contain authentication-related information
session cookie
data link
data link
XSS attacks
25. Cause of open SMTP relays
session cookie
application
misconfigured mail server
presentation
26. P2P stands for...
Internet - Local Intranet - Trusted Sites - Restricted Sites
persistent cookie
peer to peer
cookie attacks
27. Tools used to capture packets of data off a network and allow viewing of contents
packet sniffer
ActiveX
drive by download
stack
28. A named collection of Web sites that can be assigned a specific security level
zones
application decomposition
application
peer to peer
29. OSI layer 2 - verify the connection between two devices is intact (i.e. physical addressing)
cookie attacks
heap
ActiveX
data link
30. Key functionality (how the application works) is identified and an application diagram developed in this phase of threat modeling
application review
input validation
transport
java
31. More data is put into a buffer than it was designed to hold - can be caused deliberately by hackers to run malicious code
session - persistent - tracking
digitally signed java control
buffer overflow
data link
32. Attackers sniff network traffic and capture a cookie download or gain access to a computer and view locally stored cookie
open mail relay
javascript
cookie hijacking
network
33. The unauthorized modification of the data stored within a cookie
XSS attacks
presentation
security objective definition - application review - application decomposition - threat identification - vulnerability identification
cookie poisoning
34. Phases of threat modeling
security objective definition - application review - application decomposition - threat identification - vulnerability identification
threat modeling
java
peer to peer
35. Area of the memory where function calls are stored
misconfigured mail server
sandboxing
XSS
stack
36. Process to identify and assess a system's security risks
heap
application
threat modeling
cross-site scripting
37. Attacks targeting buffer overflow and cross-site scripting attack this OSI layer
application layer
P2P
heap
common off the shelf
38. Two types of buffer overflows
application layer
zones
stack and heap
application decomposition
39. OSI model layers
input validation criteria
drive by download
Application - Presentation - Session - Transport - Network - Data Link - Physical
heap
40. IP address exposure - download of worm/viruses circumventing the firewall - no way to track improper communication - messages in clear text are risks associated with
buffer overflow
digitally signed java control
java
IM
41. Can leave the sandbox and obtain access to client resources
security objective definition - application review - application decomposition - threat identification - vulnerability identification
security objective definition
data link
digitally signed java control
42. OSI layer responsible for network processes to application
application
XSS attacks
cookies
reflected XSS
43. OSI layer defines the electrical / physical device specs (media - signal - and binary transmission). This includes the layout of pins - voltages - cable specifications - hubs - network adapters - host bus adapters and more.
stack and heap
physical
P2P
cookie attacks
44. Used by java to verify the code for a list of predetermined insecurities
session - persistent - tracking
java
application
bytecode verifier
45. OSI layer that provides the means to transfer data between network entities and detect/correct errors that may occur in the physical layer
data link
threat modeling
digitally signed java control
application
46. OSI layer that provides transparent transfer of data between end users
transport
network
XSS
threat identification
47. Have a timeout value - are not deleted when the user closes their web brower - used to store user preferences and information about the use connection
drive by download
session - persistent - tracking
persistent cookie
IM
48. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
zones
P2P
application
data link
49. XSS stands for
cross-site scripting
session cookie
ActiveX
persistent cookie
50. Each client is a peer and serves each other client on the network - requires client application and appropriate open network ports to operate
peer to peer
sandboxing
data link
network