2.5.13 Check Your Understanding – Application Attacks

1. Which application attack is occurring when the victim accesses a web page and malicious scripts are unknowingly passed to their browser?

  • cross-site scripting
  • remote code execution
  • SQL injection
  • XML injection

Explanation: Cross-site scripting occurs when the victim accesses a web page and malicious scripts are unknowingly passed to their browser. Remote code execution allows a cybercriminal to take advantage of application vulnerabilities to execute any command, with the privileges of the user running the application, on the target device. An XML injection attack can corrupt the data on the XML database and threaten the security of the website. SQL injection is an attack on websites or any SQL database by inserting a malicious SQL statement in an entry field.

2. Which statement describes a buffer overflow attack?

  • Application vulnerabilities are exploited to execute commands with the privileges of the user on the target device.
  • Data is written beyond the limits of the memory area allocated to an application.
  • Data on a XML database is corrupted and threatens the security of a website.
  • Malicious scripts on a web page are unknowingly passed to the browser of the victim.

Explanation: A buffer overflow attack causes data to be written beyond the limits of the memory area allocated to an application. An XML injection attack can corrupt the data on the XML database and threaten the security of the website. Cross-site scripting occurs when the victim accesses a web page and malicious scripts are unknowingly passed to their browser. Remote code execution allows a cybercriminal to take advantage of application vulnerabilities to execute any command with the privileges of the user running the application on the target device.

3. A cybercriminal takes advantage of application vulnerabilities and executes any command, on the target device, with the privileges of the user running the application. What type of attack does this scenario describe?

  • remote code execution
  • cross-site scripting
  • SQL injection
  • XML injection

Explanation: Remote code execution allows a cybercriminal to take advantage of application vulnerabilities to execute any command with the privileges of the user running the application on the target device. Cross-site scripting occurs when the victim accesses a web page and malicious scripts are unknowingly passed to their browser. An XML injection attack can corrupt the data on the XML database and threaten the security of the website. SQL injection is an attack on websites or any SQL database accomplished by inserting a malicious SQL statement in an entry field.

4. What is a programming practice that will mitigate an application attack?

  • validate all input from outside a function
  • scan email attachments before opening them
  • educate users not to share confidential information online
  • ensure the internet service provider filters all email messages

Explanation: A specific programming practice that will help mitigate application attacks is treating and validating all input from outside a function as if it is hostile. Educating users not to share confidential information online, ensuring internet service providers filter all email messages, and always scanning email attachments before opening, are defenses against email and phishing attacks.

5. Which type of attack is used to trick a user into sharing confidential information such as login credentials and credit card numbers?

  • cross-site scripting
  • phishing
  • pharming
  • remote code execution

Explanation: Phishing occurs when a user is contacted by email or instant message and is tricked into installing malware on their device or into sharing confidential information. Pharming deliberately misdirects users to a fake version of an official website. Remote code execution allows a cybercriminal to take advantage of application vulnerabilities to execute any command with the privileges of the user running the application on the target device. Cross-site scripting occurs when the victim accesses a web page and malicious scripts are unknowingly passed to their browser.

6. Which type of attack deliberately misdirects users to a fake version of a real website?

  • vishing
  • pharming
  • whaling
  • spamming

Explanation: Pharming deliberately misdirects users to a fake version of an official website. Often referred to as voice phishing, vishing sees criminals use voice communication technology to encourage users to divulge information, such as their credit card details. Whaling is a phishing attack that targets high profile individuals. Spamming is the sending of unsolicited email, often sent in bulk by computers infected by viruses or worms, and often containing malicious links, malware, or deceptive content.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments