Exam 9: Coding in the Cube: Developing Good Habit

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Exception handling is the cornerstone for all secure code.

(True/False)
4.9/5
(27)

Data authorization is a two-way street: first, the user's ID must be validated and second the user's request needs to be authorized.

(True/False)
4.8/5
(43)

What should the application do if the user has failed to log in after 5 attempts?

(Multiple Choice)
4.8/5
(39)

It is best to wait to add debugging techniques to the code when the code is broken.

(True/False)
4.7/5
(37)

PHP is a server-side language that runs on application servers.

(True/False)
4.7/5
(37)

What type of errors when a data flow does not flow as expected?

(Multiple Choice)
4.7/5
(41)

There is only one type of error in application development: compile-time errors.

(True/False)
4.8/5
(42)

When reusable code gets buried into other code, the logic can and should be reused by other use cases.

(True/False)
4.9/5
(42)

What design pattern forces the server to create only one object in its heap, thus making the server run very efficiently while using minimum RAM?

(Multiple Choice)
4.8/5
(32)

Some popular programming languages that deal wth security include the following: -Java -PHP -C/C++

(True/False)
4.7/5
(40)

What type of list defines bad input values?

(Multiple Choice)
4.9/5
(36)

If requesting the application to provide sensitive information over the public network can sometimes be too risky, what should be done?

(Multiple Choice)
4.8/5
(27)

What type of list defines only accepted input values?

(Multiple Choice)
4.9/5
(35)

Data encapsulation hides all internal code, variables, and logic from the outside world, therefore restricting acces to any outside callers.

(True/False)
4.7/5
(37)

What you choose to tell the user in error messages is up to you, but it should specifically benefit them.

(True/False)
4.9/5
(26)

Not every request that comes into the application should be treated as a potential attack.

(True/False)
4.8/5
(44)

When logging tailored messages for an application, use a file separate from the server logs and secure the priveleges on that file.

(True/False)
4.9/5
(31)

Which is NOT a characteristic of validation the input request?

(Multiple Choice)
4.9/5
(31)

What is it called when developers write a piece of software for a specific purpose

(Multiple Choice)
4.8/5
(35)

Which statement best suits the generalization of error messages?

(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)