SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain4 Application Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI layer that establishes - manages and terminates the connections between the local and remote application
session
zones
security objective definition
XSS attacks
2. OSI layer that provides interhost communication (Named Pipes
physical
vbscript and jscript
session
cookies
3. Attackers sniff network traffic and capture a cookie download or gain access to a computer and view locally stored cookie
Application - Presentation - Session - Transport - Network - Data Link - Physical
XSS
cookie hijacking
security objective definition - application review - application decomposition - threat identification - vulnerability identification
4. Process to identify and assess a system's security risks
ActiveX
input validation
threat modeling
input validation criteria
5. Threats to defined security objects are identified using knowledge gained during application decomposition in this phase of threat modeling
cookie hijacking
cookies
XSS attacks
threat identification
6. OSI layer that provides transparent transfer of data between end users
transport
Application - Presentation - Session - Transport - Network - Data Link - Physical
IM
input validation criteria
7. Enable the cookie secure-bit setting - avoid using cookies to hold sensitive data - block third-party cookies will prevent ______
application layer
application gateways
cookie attacks
session
8. OSI layer responsible for end-to-end connections and reliability (i.e. TCP
threat identification
session - persistent - tracking
transport
presentation
9. OSI model layers
input validation criteria
stack
persistent cookie
Application - Presentation - Session - Transport - Network - Data Link - Physical
10. Ensure data input is validated - encode user supplied data - don't click on unknown hyperlinks - implement restrictive web browser security zones are preventative measures against
session - persistent - tracking
XSS attacks
peer to peer
network
11. Key functionality (how the application works) is identified and an application diagram developed in this phase of threat modeling
P2P
drive by download
application review
persistent cookie
12. OSI layer defines the electrical / physical device specs (media - signal - and binary transmission). This includes the layout of pins - voltages - cable specifications - hubs - network adapters - host bus adapters and more.
Application - Presentation - Session - Transport - Network - Data Link - Physical
stack and heap
physical
session
13. XSS stands for
cross-site scripting
session - persistent - tracking
session
reflected XSS
14. Used by java and javascript to isolate executing code in a reserved area of memory to limit damage of malicious code
session
P2P
application decomposition
sandboxing
15. Enforce application software restrictions - virus scan all files - restrict folders shared by other P2P clients are safeguards for
network
stored XSS
P2P
cross-site scripting
16. Enticing a user to execute malicious code stored on a web server (i.e. via hyperlink in an email)
cookies
persistent cookie
reflected XSS
data link
17. Scripting languages - developed by Microsoft to allow developers to extend and reuse web functionality
vbscript and jscript
application
session - persistent - tracking
P2P
18. Attack that occurs when a user navigates to a web site and hostile content is automatically downloaded and executed
P2P
Internet - Local Intranet - Trusted Sites - Restricted Sites
drive by download
ActiveX
19. Each client is a peer and serves each other client on the network - requires client application and appropriate open network ports to operate
application gateways
application
peer to peer
transport
20. Deleted when the user closes their web browser - can contain authentication-related information
data link
physical
session cookie
P2P
21. IP address exposure - download of worm/viruses circumventing the firewall - no way to track improper communication - messages in clear text are risks associated with
sandboxing
authenticode
IM
peer to peer
22. Tools used to capture packets of data off a network and allow viewing of contents
packet sniffer
tracking cookie
zones
javascript
23. The unauthorized modification of the data stored within a cookie
heap
java
packet sniffer
cookie poisoning
24. Used to record user's web activity - may be downloaded in the background
transport
cookie attacks
cookie leaking
tracking cookie
25. Two types of buffer overflows
reflected XSS
stack and heap
stored XSS
XSS attacks
26. Area of the memory where dynamically allocated variables are stored
address resolution protocol
ActiveX
heap
input validation
27. Can filter out most buffer overflow attacks
application gateways
java
authenticode
common off the shelf
28. Allow an attacker to intercept and modifiy data sent between two network devices - hijacking of network communications - attacks data link layer
ARP spoofing
sandboxing
session
physical
29. ARP stands for...
cookies
address resolution protocol
threat identification
data link
30. Categories of XSS
cookies
application layer
tracking cookie
reflected and stored
31. OSI layer 2 - verify the connection between two devices is intact (i.e. physical addressing)
cookie leaking
XSS
data link
physical
32. Sensitive information stored within a cookie that is obtained by unauthorized users
vulnerability identification
cookie poisoning
cookie leaking
packet sniffer
33. Target for trojans and viruses - used to transfer stolen/pirated data - unintentional disclosure of data are risks associated with
physical
packet sniffer
P2P
network
34. Used by java to verify the code for a list of predetermined insecurities
application review
application
bytecode verifier
tracking cookie
35. Protocols in this layer NNTP
application
reflected and stored
XSS attacks
stored XSS
36. OSI layer that provides the means to transfer data between network entities and detect/correct errors that may occur in the physical layer
javascript
stack
stack and heap
data link
37. Small text files downloaded and stored on a user's computer that contain information about the user's session and preferences
ARP spoofing
cookies
address resolution protocol
cookie leaking
38. A method of code signing - allows developers to obtain digital certificate generated by a certificate authority and digitally sign ActiveX controls
data link
data link
authenticode
peer to peer
39. Area of the memory where function calls are stored
presentation
stack
heap
security objective definition - application review - application decomposition - threat identification - vulnerability identification
40. OSI layer attributed with 75% of malicious attacks
input validation
vbscript and jscript
digitally signed java control
application
41. OSI layer that relates to the physical connection of two devices (i.e. RS-232
heap
application layer
application
physical
42. Three main cookie types
P2P
peer to peer
session - persistent - tracking
persistent cookie
43. An attack that occurs when malicious code is injected into a web site - where it is downloaded and executed by other users
physical
XSS
presentation
session cookie
44. Can leave the sandbox and obtain access to client resources
reflected and stored
presentation
application
digitally signed java control
45. A scripting language - developed by Netscape to perform client-side web development
javascript
XSS attacks
session
digitally signed java control
46. The application is reviewed and specific vulnerabilities are documented in this phase of threat modeling
input validation
network
cookie poisoning
vulnerability identification
47. Security objectives placed on an application are identified - controlling the scope of the threat modeling process
tracking cookie
application
security objective definition
cookie attacks
48. P2P stands for...
session
reflected and stored
application decomposition
peer to peer
49. Security zone options offered by Internet Explorer
Internet - Local Intranet - Trusted Sites - Restricted Sites
application layer
presentation
reflected and stored
50. Protocols used in this layer (ARP
ARP spoofing
drive by download
input validation criteria
data link