Exam 9: Coding in the Cube: Developing Good Habit
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
Data authorization is a two-way street: first, the user's ID must be validated and second the user's request needs to be authorized.
(True/False)
4.8/5
(43)
What should the application do if the user has failed to log in after 5 attempts?
(Multiple Choice)
4.8/5
(39)
It is best to wait to add debugging techniques to the code when the code is broken.
(True/False)
4.7/5
(37)
What type of errors when a data flow does not flow as expected?
(Multiple Choice)
4.7/5
(41)
There is only one type of error in application development: compile-time errors.
(True/False)
4.8/5
(42)
When reusable code gets buried into other code, the logic can and should be reused by other use cases.
(True/False)
4.9/5
(42)
What design pattern forces the server to create only one object in its heap, thus making the server run very efficiently while using minimum RAM?
(Multiple Choice)
4.8/5
(32)
Some popular programming languages that deal wth security include the following: -Java -PHP -C/C++
(True/False)
4.7/5
(40)
If requesting the application to provide sensitive information over the public network can sometimes be too risky, what should be done?
(Multiple Choice)
4.8/5
(27)
Data encapsulation hides all internal code, variables, and logic from the outside world, therefore restricting acces to any outside callers.
(True/False)
4.7/5
(37)
What you choose to tell the user in error messages is up to you, but it should specifically benefit them.
(True/False)
4.9/5
(26)
Not every request that comes into the application should be treated as a potential attack.
(True/False)
4.8/5
(44)
When logging tailored messages for an application, use a file separate from the server logs and secure the priveleges on that file.
(True/False)
4.9/5
(31)
Which is NOT a characteristic of validation the input request?
(Multiple Choice)
4.9/5
(31)
What is it called when developers write a piece of software for a specific purpose
(Multiple Choice)
4.8/5
(35)
Which statement best suits the generalization of error messages?
(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)