Exam 9: Secure Programming With Perl
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
____ is a set of Perl modules that provide a simple and consistent Application Programming Interface (API) to the World Wide Web.
(Multiple Choice)
4.7/5
(43)
Perl's ____ allows developers program security even when running extra privileges such as setuid or setgid programs.
(Multiple Choice)
4.8/5
(40)
____ is an algorithm based on a random permutation using a variable key-size stream cipher with byte-oriented operations.
(Multiple Choice)
4.7/5
(33)
Many programming languages can be used for building CGI, but the most common one is ____________________.
(Short Answer)
4.9/5
(36)
In Perl, the ternary conditional operator "____" is an exception to the principle of "one tainted value taints the whole expression."
(Multiple Choice)
4.7/5
(34)
____ is a search engine for the distributions, modules, documentation, and IDs on CPAN.
(Multiple Choice)
4.9/5
(34)
____ provides internal data checking for developers to catch malicious data coming into the program.
(Multiple Choice)
4.8/5
(44)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(36)
Communication in LWP follows hypertext transfer protocol (HTTP) and is ____.
(Multiple Choice)
4.8/5
(46)
Once a variable is tainted, Perl will allow you to use it in a system() , exec() , piped open, eval() , backtick , or unlink command.
(True/False)
4.7/5
(41)
How can you test whether a variable that contains tainted data will trigger an "Insecure dependency" message?
(Essay)
4.8/5
(26)
You can enable taint mode explicitly by using the command line flag ____.
(Multiple Choice)
5.0/5
(47)
In Perl, ____ provides a "sandbox" environment that compiles and executes code in restricted compartments.
(Multiple Choice)
4.9/5
(41)
____ is a general-purpose scripting language that is widely used to implement common gateway interface (CGI).
(Multiple Choice)
4.9/5
(37)
The safe module operation ____ permits only the provided list of operators to be used when compiling code in the compartment.
(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)