Open Systems Interconnection (OSI) and TCP/IP Security-Security Threats

0.0(0)
studied byStudied by 3 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/10

flashcard set

Earn XP

Description and Tags

required on OA

Last updated 4:21 AM on 3/20/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

11 Terms

1
New cards
SQL Injection Attack
 Security solution: Leverage a reverse proxy system and scan incoming packets for malicious behavior.

\
 OSI Layer: Application (7)
2
New cards
Man-in-the-Middle Attack
 Security solution: Mitigate by using an application-layer proxy or an IPS, and train users about fake security certificates.

\
 OSI Layer: Presentation (6)
3
New cards
RPC Attack
 Security solution: Mitigate with regular OS and application patching.

\
 OSI Layer: Session (5)
4
New cards
Port Scanner
 Security solution: Mitigate by using a packet-filtering firewall.

\
 OSI Layer: Transport (4)
5
New cards
Ping Sweep Attack
 Security solution: Mitigate by using a packet-filtering firewall.

\
 OSI Layer: Network (3)
6
New cards
VLAN Hopping
 Security solution: Configure the VLAN tagging per the switch vendor’s recommendation.

\
 OSI Layer: Data Link (2)
7
New cards
Wiretapping
 Security solution: Look for physical vulnerabilities, check the locks on doors, racks, and wiring closets.

\
 OSI Layer: Physical (1)
8
New cards
A security analyst is testing the security of an organization’s website by placing a script directly into a search box. Which level of the OSI model is the analyst addressing?
Layer 7
9
New cards
Which Transport layer protocol is best suited for streaming audio and video?
User datagram protocol (UDP)
10
New cards
A security analyst is tasked to test a website for OSI Layer 7 vulnerabilities. The first test is to see if the fields on the website will execute code on the database server integrated with the site. The analyst types some text into the "email" box in a web form:

admin' or '1'='1

The web application responds with the following message:

Invalid Email Format.

You have an error in your syntax; check the manual that corresponds to your database server version for the right syntax to use near 'in' at line 1.

Which type of exploit is this analyst assessing for?
SQL injection attack
11
New cards

Explore top flashcards

M13: Helminths
Updated 918d ago
flashcards Flashcards (33)
APEL All Vocab
Updated 252d ago
flashcards Flashcards (300)
Christianity quotes
Updated 276d ago
flashcards Flashcards (77)
Case studies
Updated 994d ago
flashcards Flashcards (22)
M13: Helminths
Updated 918d ago
flashcards Flashcards (33)
APEL All Vocab
Updated 252d ago
flashcards Flashcards (300)
Christianity quotes
Updated 276d ago
flashcards Flashcards (77)
Case studies
Updated 994d ago
flashcards Flashcards (22)