CHAPTER 7: IDENTIFYING ADVANCED ATTACKS McKinley Technology HS - Cybersecurity.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Understand Database Security Concepts
System and Network Security Practices COEN 351 E-Commerce Security.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security+ Guide to Network Security Fundamentals, Third Edition
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Hacking Web Server Defiana Arnaldy, M.Si
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Chapter Three. Which of the following protocols is a file transfer protocol using SSH? A.SFTP B.TFTP C.SICMP D.CCMP.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Chapter 6: Packet Filtering
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Module 14: Configuring Server Security Compliance
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Software Security Testing Vinay Srinivasan cell:
OSI and TCP/IP Models And Some Vulnerabilities AfNOG th May 2011 – 10 th June 2011 Tanzania By Marcus K. G. Adomey.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Module 7: Advanced Application and Web Filtering.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Role Of Network IDS in Network Perimeter Defense.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Ch 7: Identifying Advanced Attacks CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide Darril Gibson.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
CompTIA Security+ Question Answer SY Detaille of CompTIA SY0-401 Pass4sure.. VENDOR COMPTIA EXAM NAME COMPTIA SECURITY+ EXAM CODE SY0-401 TOTAL.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CompTIA Security+ Chapter 5 Test Review
Network security Vlasov Illia
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Chapter 6 Application Hardening
CompTIA Security+ SY0-401 Real Exam Question Answer
Instructor Materials Chapter 7 Network Security
Penetration Test Debrief
1.
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
Marking Scheme for Semantic-aware Web Application Security
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Lecture 2 - SQL Injection
Intrusion Detection system
Network hardening Chapter 14.
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

CHAPTER 7: IDENTIFYING ADVANCED ATTACKS McKinley Technology HS - Cybersecurity

Question 1 An attacker enters a string of data in a web application’s input form and crashes it. What type of attack is this? A. DoS B. DDoS C. Man-in-the-Middle D. Header manipulation

Question 2 What will protect against a SYN attack? A. Input validation B. Error handling C. Flood guard D. Cross-site scripting

Question 3 What can an administrator use to detect a DDoS attack? A. Privilege escalation B. Performance baseline C. Web form sanitization D. Antivirus software

Question 4 A user browsing the Internet notices erratic behavior right before the user’s system crashes. After rebooting, the system is slow and the user detects hundreds of outbound connections. What likely occurred? A. The system has become a botnet B. The system is hosting a botnet C. The system is spamming other users D. The system has joined a botnet

Question 5 A computer is regularly communicating with an unknown IRC server and sending traffic without user interaction. What is likely causing this? A. Buffer overflow B. Cross-site scripting C. Botnet D. Rootkit

Question 6 Of the following choices, what uses a command and control server? A. DoS attacks B. Trojans C. Man-in-the-Middle D. Botnet

Question 7 Of the following choices, what type of attack can intercept traffic and insert malicious code into a network conversation? A. Spim B. Xmas attack C. LDAP attack D. Man-in-the-middle

Question 8 What can a header manipulation attack modify? A. Flags B. Buffers C. Databases D. Signature definitions

Question 9 An attacker is sending false hardware address updates to a system, causing the system to redirect traffic to an attacker. What type of attack is this? A. IRC B. ARP poisoning C. Xmas attack D. DNS poisoning

Question 10 What can mitigate ARP poisoning attacks in a network? A. Disable unused ports on a switch B. Man-in-the-middle C. DMZ D. VLAN segregation

Question 11 You manage a server hosting a third-party database application. You want to ensure that the application is secure and all unnecessary services are disabled. What should you perform? A. Secure code review B. Application hardening C. White box testing D. Black box testing

Question 12 Of the following choices, what is a step used to harden a database application? A. Enabling all services B. Disabling default accounts and changing default passwords C. Disabling SQL D. Disabling stored procedures

Question 13 An organization develops its own software. Of the following choices, what is a security practice that should be included in the process? A. Check vendor documentation B. SDLC Waterfall model C. Code review D. Enabling command injection

Question 14 An attacker in entering incorrect data into a form on a web page. The result shows the attacker the type of database used by the website and provides hints on what SQL statements the database accepts. What can prevent this? A. Error handling B. Antivirus software C. Anti-spam software D. Flood guards

Question 15 Your organization hosts several websites accessible on the Internet and is conducting a security review of these sites. Of the following choices, that is the most common security issue for web-based applications? A. Input validation B. Phishing C. Whaling D. Social engineering

Question 16 An IDS detected a NOOP sled. What kind of attack does this indicate? A. Input validation B. SQL injection C. Cross-site scripting D. Buffer overflow

Question 17 A web-based application expects a user to enter eight characters into the text box. What is a potential vulnerability for this application? A. Input validation B. Buffer overflow C. SYN flood D. Flood guard

Question 18 Of the following choices, what can help prevent SQL injection attacks? A. Output validation B. NOOP sleds C. Stored procedures D. Antivirus software

Question 19 A web developer wants to prevent cross-site scripting. What should the developer do? A. Use input validation to remove hypertext B. Use input validation to remove cookies C. Use input validation to SQL statements D. Use input validation to overflow buffers

Question 20 A website prevents users from using the less- than character (<) when entering data into forms. What is it trying to prevent? A. Logic bomb B. Cross-site scripting C. Fuzzing D. SQL injection

Question 21 While analyzing an application log, you discover several entries where a user has entered the following command into a web- based form:…/etc/passwd. What does this indicate? A. Fuzzing B. Kiting C. Command injection attack D. DoS

Question 22 In regards to secure coding practices, why is input validation important? A. It mitigates buffer overflow attacks. B. It makes the code more readable. C. It provides an application configuration baseline. D. It meets gray box testing standards.

Question 24 Which of the following steps should follow the deployment of a patch? A. Antivirus and anti-malware deployment B. Audit and verification C. Fuzzing and exploitation D. Error and exception handling

Question 25 A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway? A. Cross-site scripting B. SPIM C. Client-side D. DDoS

Question 26 Which of the following tools would Matt, a security administrator, MOST likely use to analyze a malicious payload? A. Vulnerability scanner B. Fuzzer C. Port scanner D. Protocol analyzer

Question 27 Which of the following application security testing techniques is implemented when an automated system generates random input data? A. Fuzzing B. XSRF C. Hardening D. Input validation

Question 28 Which of the following application security testing techniques is implemented when an automated system generates random input data? A. Fuzzing B. XSRF C. Hardening D. Input validation

Question 30 Which of the following BEST describes a protective countermeasure for SQL injection? A. Eliminating cross-site scripting vulnerabilities B. Installing an IDS to monitor network traffic C. Validating user input in web applications D. Placing a firewall between the Internet and database servers

Question 31 Which of the following BEST describes a protective countermeasure for SQL injection? A. XSS B. SQL injection C. Directory traversal D. Packet sniffing

Question 32 When checking his webmail, Matt, a user, changes the URL’s string of characters and is able to get into another user’s inbox. This is an example of which of the following? A. Header manipulation B. SQL injection C. XML injection D. Session hijacking

Question 33 Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT A. Buffer overflow prevention B. Input validation C. CSRF prevention D. Cross-site scripting prevention

Question 34 After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen: ‘Please only use letters and numbers on these fields’ Which of the following is this an example of? A. Proper error handling B. Proper input validation C. Improper input validation D. Improper error handling

Question 35 Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected? A. Application design B. Application security C. Initial baseline configuration D. Management of interfaces

Question 36 An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that: A. it is being caused by the presence of a rogue access point. B. it is the beginning of a DDoS attack. C. the IDS has been compromised. D. the internal DNS tables have been poisoned.

Question 37 Matt, a security administrator, is receiving reports about several SQL injections and buffer overflows through his company’s website. Which of the following would reduce the amount of these attack types? A. Antivirus B. Anti-spam C. Input validation D. Host based firewalls

Question 38 Mike, a user, receives an from his grandmother stating that she is in another country and needs money. The address belongs to his grandmother. Which of the following attacks is this? A. Man-in-the-middle B. Spoofing C. Relaying D. Pharming

Question 39 Which of the following sets numerous flag fields in a TCP packet? A. XMAS attack B. DNS poisoning C. SYN flood D. ARP poisoning

Question 40 In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him understand what traffic patterns are normal on his network. Which of the following tools would help Pete determine traffic patterns? A. Syslog B. Protocol analyzer C. Proxy server D. Firewall

Question 41 Which of the following application attacks is used to gain access to SEH? A. Cookie stealing B. Buffer overflow C. Directory traversal D. XML injection

Question 42 Which of the following application attacks is used to gain access to SEH? A. Cookie stealing B. Buffer overflow C. Directory traversal D. XML injection

Question 43 Which of the following does a second authentication requirement mitigate when accessing privileged areas of a website, such as password changes or user profile changes? A. Cross-site scripting B. Cookie stealing C. Packet sniffing D. Transitive access

Question 44 A buffer overflow can result in which of the following attack types? A. DNS poisoning B. Zero-day C. Privilege escalation D. ARP poisoning

Question 45 Which of the following BEST describes a directory traversal attack? A. A malicious user can insert a known pattern of symbols in a URL to access a file in another section of the directory. B. A malicious user can change permissions or lock out user access from a webroot directory or subdirectories. C. A malicious user can delete a file or directory in the webroot directory or subdirectories. D. A malicious user can redirect a user to another website across the Internet.

Question 46 In her morning review of new vendor patches, a security administrator has identified an exploit that is marked as critical. Which of the following is the BEST course of action? A. The security administrator should wait seven days before testing the patch to ensure that the vendor does not issue an updated version, which would require reapplying the patch. B. The security administrator should download the patch and install it to her workstation to test whether it will be able to be applied to all workstations in the environment. C. The security administrator should alert the risk management department to document the patch and add it to the next monthly patch deployment cycle. D. The security administrator should download the patch to the test network, apply it to affected systems, and evaluate the results on the test systems.

Question 47 In Sara, an IT security technician, has identified security weaknesses within her company’s code. Which of the following is a common security coding issue? A. Input validation B. Application fuzzing C. Black box testing D. Vulnerability scanning

Question 48 Which of the following is an application security coding problem? A. Error and exception handling B. Patch management C. Application hardening D. Application fuzzing

Question 49 An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement? A. Implement IIS hardening by restricting service accounts. B. Implement database hardening by applying vendor guidelines. C. Implement perimeter firewall rules to restrict access. D. Implement OS hardening by applying GPOs.

Question 50 Which of the following can BEST help prevent cross- site scripting attacks and buffer overflows on a production system? A. Input validation B. Network intrusion detection system C. Anomaly-based HIDS D. Peer review