Exam 9: Secure Programming With Perl
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
The setuid and ____ are UNIX functions that deal with privileges.
Free
(Multiple Choice)
4.8/5
(20)
Correct Answer:
C
The ____________________ function is a built-in Perl routine usually used as the UNIX password-encryption function.
Free
(Short Answer)
4.7/5
(44)
Correct Answer:
crypt()
The _________________________ module enables a Perl program to use OpenSSL to parse an X.509-formatted certificate.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Crypt::OpenSSL::X509
Hypertext transfer protocol (HTTP) only allows one-way communication from the server to the client (Web browser).
(True/False)
4.9/5
(44)
____ is a tool designed to help developers to write safer scripts by forcing them to think about external input validation and protecting them from accidentally performing unsafe operations, such as unwillingly changing external resources.
(Multiple Choice)
4.9/5
(33)
The Perl's ____ function is based on the data encryption standard (DES) algorithm, and its variations are intended to discourage the use of hardware implementations of a key search.
(Multiple Choice)
4.8/5
(34)
What are the characteristics of a namespace when Perl is in safe mode?
(Essay)
4.7/5
(30)
Since CGI scripts are designed to run by individuals around the world, they are the prime targets for malicious users to exploit any vulnerability.
(True/False)
4.9/5
(34)
The main purpose of ____ is to isolate tainted data so that the script cannot use it to perform tasks unintentionally.
(Multiple Choice)
4.8/5
(29)
In Perl, any subexpression is considered tainted if all of the elements in the expression are tainted.
(True/False)
4.8/5
(26)
The two areas of concern in file processing are temporary file creation and ____ in file access.
(Multiple Choice)
4.8/5
(35)
____ permits communication and interaction from the client to the server for producing dynamic, two-way Web pages.
(Multiple Choice)
4.9/5
(33)
Variables are considered ____ if they are set with values that are retrieved from outside of the script.
(Multiple Choice)
4.9/5
(39)
In order to provide support for the HTTPS protocol under LWP, we need the ____ Perl module.
(Multiple Choice)
4.9/5
(40)
It is a good practice to verify that a variable you are planning to untaint has only bad characters (black listing) rather than check whether or not it has any good characters (white listing).
(True/False)
4.9/5
(34)
Perl provides a built-in security-checking mechanism called ____________________.
(Short Answer)
4.8/5
(33)
The safe module operation ____ returns a glob reference for the symbol table entry of VARNAME in the package of the compartment.
(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)