Exam 8: Secure Programming With C and Openssl

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

OpenSSL provides the APIs ____ for Base64 decoding.

(Multiple Choice)
4.8/5
(27)

The standard organization ____ has been developing a standard for transport layer security based on SSL, and the result is TLS version 1.

(Multiple Choice)
4.8/5
(37)

Certificate revocation is done in OpenSSL by using the ca command with the -____ option.

(Multiple Choice)
4.8/5
(34)

____________________ helps to insure the security and portability of the code, and it usually requires that the programmer explicitly define the types of each object in a program.

(Short Answer)
4.8/5
(24)

The OpenSSL command-line tool executable is called ____ on Windows.

(Multiple Choice)
4.8/5
(35)

The strlen function should only be used when '\0' terminated string is guaranteed.

(True/False)
5.0/5
(43)

C/C++ developers must do their own memory management using the standard APIs malloc(), alloc(), realloc(), free(), new() and ____ .

(Multiple Choice)
4.8/5
(27)

Why are most high-level programming languages essentially immune to buffer overflow problems?

(Essay)
4.8/5
(32)

Most block ciphers are constructed by composing several simpler functions. These ciphers are called iterated block ciphers or ____ ciphers.

(Multiple Choice)
4.8/5
(35)

____ is a symmetric key-encryption technique that will replace the commonly used DES standard.

(Multiple Choice)
4.8/5
(34)

____ is a popular software program that uses encryption techniques to encrypt and digitally sign e-mail.

(Multiple Choice)
4.9/5
(30)

A language is ____ typed if it enforces type abstractions where operations can be applied only to objects of the appropriate type.

(Multiple Choice)
4.9/5
(29)

How does hashing work?

(Essay)
4.8/5
(38)

____________________ is a specific type of stack overrun attack where the goal is to overwrite the return address of subroutines on the stack.

(Short Answer)
4.9/5
(34)

____ are usually used in conjunction with nonsecret parameters to derive one or more keys from a common secret value.

(Multiple Choice)
4.8/5
(28)

How can you revoke a certificate in OpenSSL?

(Essay)
4.7/5
(38)

____ is a protocol that provides a secure channel between two systems.

(Multiple Choice)
4.8/5
(36)

Why is it hard to write secure code with C?

(Essay)
4.8/5
(31)
Match each item with a statement below:
detect any attempt to run illegal code on the stack
GCC
an extremely common security flaw in C/C++
Library-based defenses
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
C
Correct Answer:
Verified
Premises:
Responses:
detect any attempt to run illegal code on the stack
GCC
an extremely common security flaw in C/C++
Library-based defenses
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
C
a set of programming language compilers produced by the GNU Project
AES
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Buffer overflow
holds all dynamic variables allocated by malloc() and the new operator
Base64
used to store program state such as procedure arguments, local variables, and register values
Electric Fence
used as a tool to write software programs that interact well with the operating system
Stack
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Heap
(Matching)
4.9/5
(34)

The ____ command is a PKCS#10 certificate request and certificate generating utility.

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)