Exam 1: Why You Need to Learn Secure Programming

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which software artifact best describes the system's behavior under various conditions?

(Multiple Choice)
5.0/5
(45)

Listening to other people's conversation or looking at their computer's monitor are forms of social engineering.

(True/False)
4.8/5
(39)

Integrity assures the application will be reliable when authorized users need to use the application.

(True/False)
4.8/5
(46)

This software artifact lists what the system must not do.

(Multiple Choice)
4.8/5
(28)

If a person has been developing code for 15 years, then that person should be pretty good at developing code.

(True/False)
4.8/5
(35)

The primary purpose of the IEEE is to create Web standards.

(True/False)
4.8/5
(40)

A hidden program that will cause destruction at a given time or event is?

(Multiple Choice)
4.8/5
(31)

Most cybercrimes go unnoticed.

(True/False)
4.8/5
(39)

A single clever dishonest programmer can ruin an entire application's integrity.

(True/False)
4.8/5
(32)

Traceability is when a person can visually associate one use case requirement to design documentation and ultimately the code snippet.

(True/False)
4.8/5
(36)

Which of the following journals deal with information security?

(Multiple Choice)
4.8/5
(40)

What type of attack occurs when an attacker can bypass the application's security mechanism to access the application's resources?

(Multiple Choice)
4.8/5
(44)

A type of attack that embeds JavaScript functions into HTML data elements so that pages can be redirects to other Web sites without the user knowing.

(Multiple Choice)
4.9/5
(39)

SOX (Sarbanes and Oxley) helps the credit card industry by making sure all electronic transactions are compliant to a security standard.

(True/False)
5.0/5
(37)

Confidentiality assures that the application maintains complete data privacy.

(True/False)
4.8/5
(34)

It is possible to develop a completely secure application as long as quality and security are built into the development process.

(True/False)
4.9/5
(32)

Whose mission is to promote U.S. innovation by applying technology to enhance economic security?

(Multiple Choice)
4.9/5
(37)

Software hackers get paid for performance. Therefore, if your software can not be penetrated in 48 hours or less, the application is pretty safe.

(True/False)
4.9/5
(37)

What is the best way to create defensive code?

(Multiple Choice)
4.7/5
(32)

The developer is the single most important influential person on the development team.

(True/False)
4.9/5
(36)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)