Review Questions - SYS701 - 6 - Application Security
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Adam is conducting software testing by reviewing the source code of the application. What type of code testing is Adam conducting?

  • Static code analysis (correct)
  • Dynamic code analysis
  • Fuzzing
  • Mutation testing

Charles is worried about users conducting SQL injection attacks. Which of the following solutions will best address his concerns?

  • Performing user input validation (correct)
  • Implementing TLS
  • Using secure session management
  • Enabling logging on the database

Precompiled SQL statements that only require variables to be input are an example of what type of application security control?

  • Encoding data
  • Input validation
  • Parameterized queries (correct)
  • Appropriate access controls

During a web application test, Ben discovers that the application shows SQL code as part of an error provided to application users. What should he note in his report?

<p>Improper error handling (A)</p> Signup and view all the answers

The application that Scott is writing has a flaw that occurs when two operations are attempted at the same time, resulting in unexpected results when the two actions do not occur in the expected order. What type of flaw does the application have?

<p>A race condition (B)</p> Signup and view all the answers

Every time Susan checks code into her organization's code repository, it is tested and validated, and then if accepted, it is immediately put into production. What is the term for this?

<p>Continuous delivery (B)</p> Signup and view all the answers

Tim is working on a change to a web application used by his organization to fix a known bug. What environment should he be working in?

<p>Development (B)</p> Signup and view all the answers

Ricky is concerned that developers in his organization make use of third-party code in their applications, which may introduce unknown vulnerabilities. He is concerned about the risk of the organization running code that it is not aware it is using. Which one of the following activities would best address this risk?

<p>Package monitoring (B)</p> Signup and view all the answers

Which one of the following is not an advantage of automation in cybersecurity operations?

<p>Technical debt (B)</p> Signup and view all the answers

Chris is creating a script that will automatically screen any user requests and flag those that exceed normal thresholds for manual review. What term best describes this automation use case?

<p>Guard rails (B)</p> Signup and view all the answers

Which one of the following is not a common drawback of automating cybersecurity operations?

<p>Reducing employee satisfaction (A)</p> Signup and view all the answers

Frank is investigating a security incident where the attacker entered a very long string into an input field, which was followed by a system command. What type of attack likely took place?

<p>Buffer overflow (D)</p> Signup and view all the answers

What type of attack places an attacker in the position to eavesdrop on communications between a user and a web server?

<p>On-path attack (A)</p> Signup and view all the answers

Tom is a software developer who creates code for sale to the public. He would like to assure his users that the code they receive actually came from him. What technique can he use to best provide this assurance?

<p>Code signing (A)</p> Signup and view all the answers

Chris is reviewing evidence of a cross-site scripting attack where the attacker embedded JavaScript in a URL that a user clicked. The web page then sent the JavaScript to the user in the displayed page. What term best describes this attack?

<p>Reflected XSS (A)</p> Signup and view all the answers

Joe checks his web server logs and sees that someone sent the following query string to an application running on the server: www.mycompany.com/servicestatus.php?serviceID=892&serviceID=892’%20;DROP%20TABLE%20Services;--

What type of attack was most likely attempted?

<p>Parameter pollution (C)</p> Signup and view all the answers

Upon further inspection, Joe finds a series of thousands of requests to the same URL coming from a single IP address. Here are a few examples: www.mycompany.com/servicestatus.php?serviceID=1 www.mycompany.com/servicestatus.php?serviceID=2 www.mycompany.com/servicestatus.php?serviceID=3 www.mycompany.com/servicestatus.php?serviceID=4 www.mycompany.com/servicestatus.php?serviceID=5 www.mycompany.com/servicestatus.php?serviceID=6

What type of vulnerability was the attacker likely trying to exploit?

<p>Insecure direct object reference (A)</p> Signup and view all the answers

Joe's adventures in web server log analysis are not yet complete. As he continues to review the logs, he finds the request: www.mycompany.com/../../../etc/passwd

What type of attack was most likely attempted?

<p>Directory traversal (C)</p> Signup and view all the answers

Wendy is a penetration tester who wishes to engage in a session hijacking attack. What information is crucial for Wendy to obtain if her attack will be successful?

<p>Session cookie (B)</p> Signup and view all the answers

Joe is examining the logs for his web server and discovers that a user sent input to a web application that contained the string WAITFOR. What type of attack was the user likely attempting?

<p>Timing-based SQL injection (A)</p> Signup and view all the answers

Flashcards

Static Code Analysis

Analyzing application source code to identify vulnerabilities without executing the code.

User Input Validation

Verifying that user-supplied data meets expected criteria before processing it.

Parameterized Queries

SQL statements with placeholders for variables, preventing direct SQL code insertion by users.

Improper Error Handling

Displaying sensitive system information, like SQL code, in error messages.

Signup and view all the flashcards

Race Condition

A flaw where simultaneous operations lead to unexpected outcomes due to incorrect sequencing.

Signup and view all the flashcards

Continuous Delivery

Code changes are automatically tested, validated, and deployed to production immediately after acceptance.

Signup and view all the flashcards

Development Environment

An isolated environment where developers can work on code changes without affecting production systems.

Signup and view all the flashcards

Package Monitoring

Monitoring third-party software components used in applications to identify known vulnerabilities.

Signup and view all the flashcards

Guard Rails

Implementing pre-defined rules to automatically flag user requests that deviate from normal behavior.

Signup and view all the flashcards

Buffer Overflow

A vulnerability where a program writes data beyond the allocated buffer, potentially overwriting adjacent memory.

Signup and view all the flashcards

On-Path Attack

An attacker intercepts communication between a user and a server.

Signup and view all the flashcards

Code Signing

Using a digital signature to verify the authenticity and integrity of software code.

Signup and view all the flashcards

Reflected XSS

Injecting malicious JavaScript into a website that is then reflected back to users, executing in their browsers.

Signup and view all the flashcards

Parameter Pollution

Exploiting web applications by sending multiple identical or slightly modified parameters in a query string.

Signup and view all the flashcards

Insecure Direct Object Reference

Accessing internal objects by guessing or manipulating direct references, bypassing authorization.

Signup and view all the flashcards

Directory Traversal

Accessing files and directories outside the intended root directory by manipulating file paths.

Signup and view all the flashcards

Session Hijacking

Stealing a valid session cookie to impersonate a user and gain unauthorized access.

Signup and view all the flashcards

Timing-Based SQL Injection

Exploiting timing vulnerabilities in SQL queries to infer information about the database structure or data.

Signup and view all the flashcards

Technical Debt

Cybersecurity automation can introduce unseen problems in the code of security tools.

Signup and view all the flashcards

Cost of entry

Automated cybersecurity operations can be expensive and often require specialized knowledge.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser