SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attacks targeting buffer overflow and cross-site scripting attack this OSI layer
drive by download
presentation
application layer
Application - Presentation - Session - Transport - Network - Data Link - Physical
2. An attack that occurs when malicious code is injected into a web site - where it is downloaded and executed by other users
ActiveX
open mail relay
heap
XSS
3. Can leave the sandbox and obtain access to client resources
application
physical
reflected and stored
digitally signed java control
4. OSI layer responsible for network processes to application
session cookie
common off the shelf
presentation
application
5. IP address exposure - download of worm/viruses circumventing the firewall - no way to track improper communication - messages in clear text are risks associated with
application decomposition
IM
common off the shelf
bytecode verifier
6. This layer formats and encrypts data to be sent across a network - providing freedom from compatibility problems - sometimes called the syntax layer
session - persistent - tracking
cookie poisoning
cookie hijacking
presentation
7. Security zone options offered by Internet Explorer
ActiveX
Internet - Local Intranet - Trusted Sites - Restricted Sites
open mail relay
physical
8. Attackers sniff network traffic and capture a cookie download or gain access to a computer and view locally stored cookie
cookie hijacking
network
presentation
vulnerability identification
9. Scripting languages - developed by Microsoft to allow developers to extend and reuse web functionality
P2P
vbscript and jscript
tracking cookie
java
10. Can filter out most buffer overflow attacks
security objective definition
authenticode
application gateways
misconfigured mail server
11. Categories of XSS
drive by download
reflected and stored
threat modeling
ARP spoofing
12. Server misused to forward spam - DoS conditions - damage to brand - blacklist on spam sites are risks associated with
javascript
cookie leaking
buffer overflow
open mail relay
13. Sensitive information stored within a cookie that is obtained by unauthorized users
zones
cookie leaking
vbscript and jscript
application review
14. Used by java and javascript to isolate executing code in a reserved area of memory to limit damage of malicious code
sandboxing
network
session
security objective definition
15. OSI layer attributed with 75% of malicious attacks
session
cookies
application
address resolution protocol
16. Type - length - format - range
misconfigured mail server
session cookie
input validation criteria
input validation
17. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
bytecode verifier
vulnerability identification
common off the shelf
authenticode
18. OSI model layers
transport
misconfigured mail server
session cookie
Application - Presentation - Session - Transport - Network - Data Link - Physical
19. Key functionality (how the application works) is identified and an application diagram developed in this phase of threat modeling
application review
heap
XSS
reflected XSS
20. Phases of threat modeling
cookie hijacking
authenticode
address resolution protocol
security objective definition - application review - application decomposition - threat identification - vulnerability identification
21. Cause of open SMTP relays
session
misconfigured mail server
XSS attacks
application
22. Number one safeguard against buffer overflow - XSS - data injection - and DoS attacks
java
input validation
data link
ARP spoofing
23. OSI layer responsible for end-to-end connections and reliability (i.e. TCP
transport
P2P
session
application decomposition
24. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
P2P
cookie leaking
input validation
peer to peer
25. Small text files downloaded and stored on a user's computer that contain information about the user's session and preferences
peer to peer
reflected XSS
cookies
cross-site scripting
26. Malicious code stored in a web application that is downloaded and executed without the user's knowledge
java
network
stored XSS
application layer
27. Three main cookie types
zones
network
cookies
session - persistent - tracking
28. Area of the memory where function calls are stored
zones
bytecode verifier
stack
transport
29. Enable the cookie secure-bit setting - avoid using cookies to hold sensitive data - block third-party cookies will prevent ______
security objective definition - application review - application decomposition - threat identification - vulnerability identification
cookie poisoning
cross-site scripting
cookie attacks
30. A scripting language - developed by Netscape to perform client-side web development
session
presentation
javascript
reflected XSS
31. OSI layer responsible for path determination and logical addressing - routers operate at this layer
data link
network
cookie hijacking
application layer
32. Phase of threat modeling that reviews application ingress and egress data flow and trust boundaries
heap
session - persistent - tracking
application decomposition
XSS
33. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
P2P
security objective definition
authenticode
network
34. OSI layer defines the electrical / physical device specs (media - signal - and binary transmission). This includes the layout of pins - voltages - cable specifications - hubs - network adapters - host bus adapters and more.
application layer
physical
data link
application
35. OSI layer responsible for data representation and encryption (MIME
presentation
P2P
IM
physical
36. OSI layer that provides the means to transfer data between network entities and detect/correct errors that may occur in the physical layer
security objective definition
drive by download
presentation
data link
37. OSI layer that provides interhost communication (Named Pipes
session
threat modeling
tracking cookie
ActiveX
38. Area of the memory where dynamically allocated variables are stored
peer to peer
heap
vbscript and jscript
ActiveX
39. Attack that occurs when a user navigates to a web site and hostile content is automatically downloaded and executed
address resolution protocol
drive by download
cookie poisoning
stack and heap
40. Have a timeout value - are not deleted when the user closes their web brower - used to store user preferences and information about the use connection
persistent cookie
ActiveX
cookie attacks
security objective definition
41. The unauthorized modification of the data stored within a cookie
zones
cookie poisoning
vulnerability identification
threat identification
42. Threats to defined security objects are identified using knowledge gained during application decomposition in this phase of threat modeling
common off the shelf
application review
threat identification
presentation
43. A method of code signing - allows developers to obtain digital certificate generated by a certificate authority and digitally sign ActiveX controls
session - persistent - tracking
transport
vbscript and jscript
authenticode
44. Ensure data input is validated - encode user supplied data - don't click on unknown hyperlinks - implement restrictive web browser security zones are preventative measures against
XSS attacks
common off the shelf
application
security objective definition
45. A microsoft created technology that enables software applications to share and reuse software components - maybe used to access files on local system or system registry
ActiveX
stored XSS
heap
threat modeling
46. Process to identify and assess a system's security risks
digitally signed java control
stored XSS
drive by download
threat modeling
47. Security objectives placed on an application are identified - controlling the scope of the threat modeling process
security objective definition
input validation criteria
digitally signed java control
P2P
48. COTS stands for
presentation
common off the shelf
open mail relay
buffer overflow
49. XSS stands for
network
cross-site scripting
Internet - Local Intranet - Trusted Sites - Restricted Sites
packet sniffer
50. A programming language - developed by Sun - used to make small applications (applets) for the Internet and stand alone programs
application
open mail relay
zones
java