Exam 9: Secure Programming With Perl

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The setuid and ____ are UNIX functions that deal with privileges.

Free
(Multiple Choice)
4.8/5
(20)
Correct Answer:
Verified

C

The ____________________ function is a built-in Perl routine usually used as the UNIX password-encryption function.

Free
(Short Answer)
4.7/5
(44)
Correct Answer:
Verified

crypt()

The _________________________ module enables a Perl program to use OpenSSL to parse an X.509-formatted certificate.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

Crypt::OpenSSL::X509

Hypertext transfer protocol (HTTP) only allows one-way communication from the server to the client (Web browser).

(True/False)
4.9/5
(44)

____ is a tool designed to help developers to write safer scripts by forcing them to think about external input validation and protecting them from accidentally performing unsafe operations, such as unwillingly changing external resources.

(Multiple Choice)
4.9/5
(33)

What are some of the Perl's taint mode exceptions?

(Essay)
4.8/5
(38)

The Perl's ____ function is based on the data encryption standard (DES) algorithm, and its variations are intended to discourage the use of hardware implementations of a key search.

(Multiple Choice)
4.8/5
(34)

What are the characteristics of a namespace when Perl is in safe mode?

(Essay)
4.7/5
(30)

Since CGI scripts are designed to run by individuals around the world, they are the prime targets for malicious users to exploit any vulnerability.

(True/False)
4.9/5
(34)

The main purpose of ____ is to isolate tainted data so that the script cannot use it to perform tasks unintentionally.

(Multiple Choice)
4.8/5
(29)

How can you set values for a variable in Perl?

(Essay)
4.7/5
(29)

In Perl, any subexpression is considered tainted if all of the elements in the expression are tainted.

(True/False)
4.8/5
(26)

The two areas of concern in file processing are temporary file creation and ____ in file access.

(Multiple Choice)
4.8/5
(35)

____ permits communication and interaction from the client to the server for producing dynamic, two-way Web pages.

(Multiple Choice)
4.9/5
(33)

Variables are considered ____ if they are set with values that are retrieved from outside of the script.

(Multiple Choice)
4.9/5
(39)

In order to provide support for the HTTPS protocol under LWP, we need the ____ Perl module.

(Multiple Choice)
4.9/5
(40)

It is a good practice to verify that a variable you are planning to untaint has only bad characters (black listing) rather than check whether or not it has any good characters (white listing).

(True/False)
4.9/5
(34)

Perl provides a built-in security-checking mechanism called ____________________.

(Short Answer)
4.8/5
(33)

The safe module operation ____ returns a glob reference for the symbol table entry of VARNAME in the package of the compartment.

(Multiple Choice)
4.9/5
(35)

What are some of the characteristics of Perl's taint mode?

(Essay)
4.8/5
(37)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)