Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
Security Comp TIA 701
> Memory Injections 2.3 > Flashcards
Memory Injections 2.3 Flashcards
(2 cards)
Study These Flashcards
1
Q
Dynamic Link Library (DLL)
A
A piece of code that can add functionality to a program through the inclusion of library routines linked at runtime.
Process of adding to a program, at run time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
DLL Injection
A
The process of adding to a program at runtime.
Capitalizing on a specific function vulnerability, allows the attacker to inject a path to a malicious DLL.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
Security Comp TIA 701
flashcards
Decks in class (75)
# Cards
Security Controls 1.1
42
THE CIA/AIC Triad 1.2
14
Non-Repudiation 1.2
7
Authentication, Authorization, & Account 1.2
11
Gap Analysis 1.2
10
Zero Trust 1.2
15
Physical Security 1.2
10
Deception and Disruption 1.2
5
Change Management 1.3
18
Technical Change Management 1.3
16
Public Key Infrastructure 1.4
8
Encrypting Data 1.4
11
Key Exchange 1.4
4
Encyrption Technologies 1.4
8
Obfuscation 1.4
8
Hashing and Digital Signatures 1.4
13
Blockchain Technology 1.4
3
Certificates 1.4
14
Threat Actors 2.1
14
Common Threat Vector 2.2
20
Phishing 2.2
6
Impersonation 2.2
6
Watering Hole Attacks 2.2
3
Misinformation and Disinformation 2.2
3
Memory Injections 2.3
2
Buffer Overflows 2.3
2
Race Condition 2.3
2
Malicious Updates 2.3
1
Operating System Vulnerabilities 2.3
2
SQL Injection 2.3
4
Cross Site Scripting 2.3
4
Hardware Vulnerabilities 2.3
8
Virtualization Security 2.3
10
Cloud-Specific Vulnerabilities 2.3
5
Supply Chain Attack 2.3
6
Misconfiguration Vulnerabilities 2.3
9
Mobile Device Vulnerabilities 2.3
5
Zero-Day Vulnerabilities 2.3
2
An Overview of Malware 2.4
7
Virus and Worms 2.4
9
Spyware and Bloatware 2.4
5
Other Malware Types 2.4
8
Physical Attacks 2.4
5
Denial of Service 2.4
5
DNS Poisoning 2.4
8
Wireless Attacks 2.4
9
On-path Attacks 2.4
6
Replay Attacks 2.4
10
Malicious Code 2.4
2
Application Attack 2.4
11
Cryptographic Attacks 2.4
5
Password Attacks 2.4
6
Indicators of Compromise 2.4
14
Segmentation and Access Control 2.5
13
Mitigation Techniques 2.5
17
Hardening Technique 2.5
17
Cloud Infrastructure 3.1
5
Data Types and Classifications 3.3
20
Resiliency 3.4
3
Recovery Testing 3.4
6
Hardening Targets 4.1
17
Vulnerability Remediation 4.3
20
Firewalls 4.5
10
Web Filtering 4.5
15
Access Control 4.6
10
Multi-factor Authentication 4.6
4
Incident Planning 4.8
8
Log Data 4.9
16
Security Policies 5.1
24
Data and Responsibilities 5.1
3
Risk Analysis 5.2
17
Business Analysis Impact 5.2
5
Agreement Types 5.3
10
Compliance 5.4
22
Penetration Testing 5.5
9