Exam 9: Coding in the Cube: Developing Good Habit
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
If logic bombs or Trojan horses were to be snuck in, what type of file would the easiest target?
(Multiple Choice)
4.8/5
(47)
What is it called when existing bodies of logic are broken up and moved into many smaller bodies of code?
(Multiple Choice)
4.7/5
(34)
Parameter-driven software is software that looks up values stored in a database and determines what to display, allow, or execute based on those values.
(True/False)
4.8/5
(33)
Input cleansing is an optional task for securing the application.
(True/False)
4.8/5
(36)
Which program language is vulnerable to a buffer overflow attack?
(Multiple Choice)
4.8/5
(22)
PHP is the most popular server-side language in Web development and continues to evolve as the market leader in application security.
(True/False)
4.9/5
(31)
An exception handler can only be created to log error messages for developers.
(True/False)
4.8/5
(41)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)