Exam 1: Why You Need to Learn Secure Programming

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which standard specifies that all company financial statements and records are compliant with industry standard accounting rules and regulations?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

D

A design flaw in the application that can be exploited to access the application's resources.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

A

What is the best defense against attacks to mobile devices?

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

Social engineering is a complicated attack to learn and carry out.

(True/False)
4.8/5
(35)

W3C sets standards for Web browsers, JavaScript, and HTML tags.

(True/False)
4.9/5
(49)

Which of the following standards require participants to build and maintain secure software applications?

(Multiple Choice)
4.9/5
(34)

Which software artifact depicts how the application could incur abuses from the user?

(Multiple Choice)
4.8/5
(44)

Mobile devices are critical to an application's security. Therefore, stringent rules should be followed to ensure they are never lost or damaged.

(True/False)
5.0/5
(40)

A use case describes the security of the application.

(True/False)
4.8/5
(27)

Stealing hardware, cutting system cable, or taking application software are examples of what type of attack?

(Multiple Choice)
4.9/5
(40)

Software requirements document how the system is architected.

(True/False)
4.8/5
(30)

Record retention includes printing confidential information to printers.

(True/False)
4.8/5
(33)

Physical attacks occur when software on a machine secretly gathers information about a users activity.

(True/False)
4.8/5
(40)

UML is a notation that communicates application design, requirements, and process flow.

(True/False)
4.9/5
(39)

Software artifacts are:

(Multiple Choice)
4.8/5
(42)

Stakeholders are the users of the application.

(True/False)
5.0/5
(40)

Every electronic transaction exposes data to an opportunity for an attack.

(True/False)
4.9/5
(42)

Developers will be able to work from remote places by using this technology provided by Citrix.

(Multiple Choice)
4.9/5
(44)

ISO sets standards world wide so that one uniform practice exists in a particular industry.

(True/False)
4.8/5
(34)

Creating a Web site that appears to be someone else's Web site in order to obtain financial or other private information is called?

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)