Exam 8: Secure Programming With C and Openssl
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
The standard organization ____ has been developing a standard for transport layer security based on SSL, and the result is TLS version 1.
(Multiple Choice)
4.8/5
(37)
Certificate revocation is done in OpenSSL by using the ca command with the -____ option.
(Multiple Choice)
4.8/5
(34)
____________________ helps to insure the security and portability of the code, and it usually requires that the programmer explicitly define the types of each object in a program.
(Short Answer)
4.8/5
(24)
The OpenSSL command-line tool executable is called ____ on Windows.
(Multiple Choice)
4.8/5
(35)
The strlen function should only be used when '\0' terminated string is guaranteed.
(True/False)
5.0/5
(43)
C/C++ developers must do their own memory management using the standard APIs malloc(), alloc(), realloc(), free(), new() and ____ .
(Multiple Choice)
4.8/5
(27)
Why are most high-level programming languages essentially immune to buffer overflow problems?
(Essay)
4.8/5
(32)
Most block ciphers are constructed by composing several simpler functions. These ciphers are called iterated block ciphers or ____ ciphers.
(Multiple Choice)
4.8/5
(35)
____ is a symmetric key-encryption technique that will replace the commonly used DES standard.
(Multiple Choice)
4.8/5
(34)
____ is a popular software program that uses encryption techniques to encrypt and digitally sign e-mail.
(Multiple Choice)
4.9/5
(30)
A language is ____ typed if it enforces type abstractions where operations can be applied only to objects of the appropriate type.
(Multiple Choice)
4.9/5
(29)
____________________ is a specific type of stack overrun attack where the goal is to overwrite the return address of subroutines on the stack.
(Short Answer)
4.9/5
(34)
____ are usually used in conjunction with nonsecret parameters to derive one or more keys from a common secret value.
(Multiple Choice)
4.8/5
(28)
____ is a protocol that provides a secure channel between two systems.
(Multiple Choice)
4.8/5
(36)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(34)
The ____ command is a PKCS#10 certificate request and certificate generating utility.
(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)