Exam 9: Coding in the Cube: Developing Good Habit

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If logic bombs or Trojan horses were to be snuck in, what type of file would the easiest target?

(Multiple Choice)
4.8/5
(47)

What is it called when existing bodies of logic are broken up and moved into many smaller bodies of code?

(Multiple Choice)
4.7/5
(34)

Parameter-driven software is software that looks up values stored in a database and determines what to display, allow, or execute based on those values.

(True/False)
4.8/5
(33)

Input cleansing is an optional task for securing the application.

(True/False)
4.8/5
(36)

What type of errors are found in syntax?

(Multiple Choice)
4.8/5
(34)

A method's signature is an example of limited code.

(True/False)
4.8/5
(34)

What is the best way to handle program errors?

(Multiple Choice)
5.0/5
(36)

Which program language is vulnerable to a buffer overflow attack?

(Multiple Choice)
4.8/5
(22)

PHP is the most popular server-side language in Web development and continues to evolve as the market leader in application security.

(True/False)
4.9/5
(31)

An exception handler can only be created to log error messages for developers.

(True/False)
4.8/5
(41)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)