OFFICIAL (ISC)² SSCP -
DOMAIN 7: SYSTEMS AND
APPLICATION SECURITY
Botnet - ANS >>An army of compromised machines that are under the command and control of a single
"botmaster."
Buffer Overflow Attack - ANS >>An attack that exploits programs with poor buffer management.
Covert Channel - ANS >>Hidden use of bandwidth or storage to communicate or hide a message.
Cross-site Scripting - ANS >>A hacking technique that leverages vulnerabilities in the code of a web
application to allow an attacker to send malicious content from an end user and collect some type of
data from the victim.
Dropper - ANS >>A malicious file used to install malicious code on a computer.
File Infector - ANS >>Viruses that infect files.
Backdoor Attack - ANS >>An attack that exploits an unprotected access method or pathway.
Keylogger - ANS >>A type of Trojan used to capture data keylogged on a system.
Logic Bomb - ANS >>A type of Trojan that typically executes a destructive routine when certain
conditions are met, such as date and time.
1