Deck 8: Application Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 8: Application Security
1
Operating system hardening is more total work than application hardening.
False
2
The most popular way for hackers to take over hosts today is ________.
A) by taking over the operating system
B) by taking over an application
C) by guessing the root password
D) by taking over the user interface
A) by taking over the operating system
B) by taking over an application
C) by guessing the root password
D) by taking over the user interface
B
3
Programmers can trust user input if the person is strongly authenticated.
False
4
The user reaches a webpage before logging in. This is a(n) ________ attack.
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
When securing application configuration settings, default password settings should not be changed.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
If a hacker takes over an application program, he or she receives the permissions with which the program runs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
An attacker types more data in a field than the programmer expected. This is a(n) ________ attack.
A) denial-of-service
B) directory traversal
C) buffer overflow
D) XSS
A) denial-of-service
B) directory traversal
C) buffer overflow
D) XSS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
To prevent eavesdropping, applications should ________.
A) be updating regularly
B) use electronic signatures
C) use encryption for confidentiality
D) use encryption for authentication
A) be updating regularly
B) use electronic signatures
C) use encryption for confidentiality
D) use encryption for authentication
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Generally speaking, vendors use similar mechanisms for downloading and installing patches.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
The first task in security is to understand the environment to be protected.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
In a stack overflow attack, to where does the return address point?
A) To the beginning of the stack entry's data area
B) To the end of the stack entry's data area
C) To the next command in the program being hacked
D) To the return address entry in the stack entry
A) To the beginning of the stack entry's data area
B) To the end of the stack entry's data area
C) To the next command in the program being hacked
D) To the return address entry in the stack entry
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Baselines are used to go beyond default installation configurations for high-value targets.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Experts advise firms to turn on most or all applications and then harden them.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Operating system account passwords provide limited protection.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
In a(n) ________ attack, the user enters part of a database query instead of giving the expected input.
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Overall for firms, which is more time consuming to patch?
A) Applications
B) Operating systems
C) Both are about equally time consuming to patch
D) None of the above
A) Applications
B) Operating systems
C) Both are about equally time consuming to patch
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
In a(n) ________ attack, information that a user enters is sent back to the user in a webpage.
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
When executing attack code, if the attacker has skillfully overwritten the return address, the return address will not point back to "data" in the buffer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
For all applications, a basic rule is ________.
A) always trust user input
B) sometimes trust user input
C) never trust user input
D) None of the above
A) always trust user input
B) sometimes trust user input
C) never trust user input
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
In a URL, ".." (without the quotes) means ________.
A) move one directory up
B) move one directory down
C) move to the operating system's root directory
D) ignore the last entry
A) move one directory up
B) move one directory down
C) move to the operating system's root directory
D) ignore the last entry
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Developers have permissions on the ________.
A) development server
B) testing server
C) production server
D) Both A and B
A) development server
B) testing server
C) production server
D) Both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
E-commerce software is not complex and has few subsystems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Accepting cookies is necessary to use many websites.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
Users usually must click on malicious links in order to execute them.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Website defacement occurs when attackers take over a computer and produce false web pages.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Whisker is a popular tool for ________.
A) reading website error logs
B) providing a webserver proxy in front of the webserver
C) conducting vulnerability testing on webservers
D) All of the above
A) reading website error logs
B) providing a webserver proxy in front of the webserver
C) conducting vulnerability testing on webservers
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
Java applets are large Java programs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Testers have permissions on the ________.
A) development server
B) testing server
C) production server
D) Both A and B
A) development server
B) testing server
C) production server
D) Both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Blind SQL injection uses a series of SQL statements that produce different responses based on true/false questions, or timed responses.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Code on a webpage that is executed on the client PC is ________.
A) a Trojan horse
B) a Virus
C) mobile code
D) an XSS attack
A) a Trojan horse
B) a Virus
C) mobile code
D) an XSS attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following are reasons to ensure WWW Service and E-Commerce security?
A) Cost of disruptions
B) Customer fraud
C) Exposure of sensitive private information
D) All of the above
A) Cost of disruptions
B) Customer fraud
C) Exposure of sensitive private information
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Compared to full programming languages, scripts are ________ in what they can do.
A) more limited
B) less limited
C) about as limited (but easier to use)
D) not limited at all
A) more limited
B) less limited
C) about as limited (but easier to use)
D) not limited at all
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Most firms do a satisfactory job overseeing the deployment of custom programs used to supplement packaged software.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Custom programs generally are safe because attackers do not know the code.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
JavaScript is a scripted form of Java.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
________ errors may indicate that an attacker is trying to send invalid data to the server.
A) 404
B) 303
C) 500
D) 512
A) 404
B) 303
C) 500
D) 512
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is the most dangerous because it can do more on a computer when it is executed?
A) Active-X
B) Java
C) Javascript
D) VBscript
A) Active-X
B) Java
C) Javascript
D) VBscript
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Cookies can used to track users at a website.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Attacks in which a user reaches a directory outside of the WWW root directory and its subdirectories is called a(n) ________ attack.
A) cross-site scripting
B) SQL injection
C) mobile code
D) directory traversal
A) cross-site scripting
B) SQL injection
C) mobile code
D) directory traversal
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
To take advantage of user typing errors, attackers register site names that are similar to those of legitimate domain names.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
On a compromised computer, if you mistype the name of a URL, you may be taken to a malicious website even if you set your browser security to high.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Cookies are dangerous because they ________.
A) allow a website to track what pages you have visited
B) may contain sensitive private information about you
C) Both A and B
D) Neither A nor B
A) allow a website to track what pages you have visited
B) may contain sensitive private information about you
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
PKI uses circles of trust.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Encryption is heavily used in commercial e-mail.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
The prevention of sensitive information from being sent out of a company is called ________.
A) unified threat management
B) antivirus filtering
C) attachment deletion
D) extrusion prevention
A) unified threat management
B) antivirus filtering
C) attachment deletion
D) extrusion prevention
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
Under what Internet Options tabs are general security settings for websites controlled?
A) Privacy
B) Security
C) Protection
D) Advanced
A) Privacy
B) Security
C) Protection
D) Advanced
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following uses a PKI?
A) S/MIME
B) PGP
C) Both A and B
D) Neither A nor B
A) S/MIME
B) PGP
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
E-mail filtering can be done at which of the following?
A) The user's PC
B) The corporate e-mail servers
C) E-mail managed service providers
D) All of the above
A) The user's PC
B) The corporate e-mail servers
C) E-mail managed service providers
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
Scripts do not have the ability to permanently change your computer registry.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
In Internet Explorer, the Security tab controls the website's pop-up blocker.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Under what Internet Options tabs are cookies controlled?
A) Privacy
B) Security
C) Protection
D) Advanced
A) Privacy
B) Security
C) Protection
D) Advanced
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Which comes third in a VoIP packet?
A) RTP header
B) UDP header
C) IP header
D) codec byte stream
A) RTP header
B) UDP header
C) IP header
D) codec byte stream
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
Spammers are one reason that some companies have outsourced e-mail filtering.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
Spammers use sticky spam, which presents their message as a graphical image.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
A down side of spam filtering is the deletion of some legitimate messages.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
What e-mail standard provides end-to-end security?
A) SSL/TLS
B) S/MIME
C) Both A and B
D) Neither A nor B
A) SSL/TLS
B) S/MIME
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
With Active-X controls, active scripting is enabled by default.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
SSL/TLS provides security ________.
A) between the sender and his or her e-mail server
B) all the way between the sender and the receiver
C) Both A and B
D) Neither A nor B
A) between the sender and his or her e-mail server
B) all the way between the sender and the receiver
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A VoIP caller wishing to contact another sends an INVITE message to ________.
A) the caller's H.323 proxy server
B) the receiver's H.323 proxy server
C) the receiver directly
D) None of the above
A) the caller's H.323 proxy server
B) the receiver's H.323 proxy server
C) the receiver directly
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Someone breaks into a corporate VoIP system to place free long-distance and international toll calls. This is referred to by security professionals as ________.
A) toll fraud
B) VoIP hacking
C) phone phreaking
D) blue boxing
A) toll fraud
B) VoIP hacking
C) phone phreaking
D) blue boxing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
VoIP security can easily be implemented even if the company's basic security is weak.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following is not a signaling protocol?
A) RTP
B) SIP
C) H.323
D) All of the above ARE signaling protocols.
A) RTP
B) SIP
C) H.323
D) All of the above ARE signaling protocols.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
RTP adds ________ to UDP.
A) security
B) sequence numbers
C) Both A and B
D) Neither A nor B
A) security
B) sequence numbers
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
SIP Identity protocols ________.
A) ensure that traffic is authenticated between two companies holding public/private keys
B) are uncommon on IP telephones
C) Both A and B
D) Neither A nor B
A) ensure that traffic is authenticated between two companies holding public/private keys
B) are uncommon on IP telephones
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
A PSTN gateway translates between a VoIP network's ________ protocols and those of the public switched telephone network.
A) signaling
B) transport
C) Both A and B
D) Neither A nor B
A) signaling
B) transport
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
SIP proxy servers are used in ________.
A) transport transmissions
B) signaling transmissions
C) Both A and B
D) Neither A nor B
A) transport transmissions
B) signaling transmissions
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
Signaling is the carriage of voice between two parties.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Eavesdropping can be thwarted by encrypting ________.
A) signaling traffic
B) transport traffic
C) Both A and B
D) Neither A nor B
A) signaling traffic
B) transport traffic
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Like the public switched telephone network, VoIP technology is a closed system.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Spam over VoIP is called ________.
A) VAM
B) SOVI
C) SPIT
D) SPIP
A) VAM
B) SOVI
C) SPIT
D) SPIP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
RTP stands for ________.
A) Real Transfer Protocol
B) Real Time Protocol
C) Real Transport Protocol
D) None of the above
A) Real Transfer Protocol
B) Real Time Protocol
C) Real Transport Protocol
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
DoS attacks against VoIP can be successful even if they increase latency only slightly.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
SIP identity protocols are common on IP telephones.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
SPIT is where the attacker uses the corporate VoIP network to place free calls.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
RTP is used in ________.
A) signaling
B) transport
C) Both A and B
D) Neither A nor B
A) signaling
B) transport
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
Transport consists of communication to manage the network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
In VoIP, encryption may ________.
A) reduce throughput
B) increase jitter
C) increase latency
D) make traffic unreadable
A) reduce throughput
B) increase jitter
C) increase latency
D) make traffic unreadable
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Signaling does not consist of communication to manage the network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck