Exam 11: Software Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Without suitable synchronization of accesses it is possible that values
may be corrupted,or changes lost,due to over-lapping access,use, and replacement of shared values.
Free
(True/False)
4.7/5
(33)
Correct Answer:
True
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.
Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
A
To counter XSS attacks a defensive programmer needs to explicitly
identify any assumptions as to the form of input and to verify that any
input data conform to those assumptions before any use of the data.
Free
(True/False)
4.9/5
(30)
Correct Answer:
False
UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.
(Short Answer)
5.0/5
(44)
The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.
(Short Answer)
4.8/5
(39)
Security flaws occur as a consequence of sufficient checking and
validation of data and error codes in programs.
(True/False)
4.7/5
(36)
Programmers often make assumptions about the type of inputs a
program will receive.
(True/False)
4.9/5
(27)
In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
(Short Answer)
4.8/5
(39)
_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.
(Multiple Choice)
5.0/5
(28)
__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser.
(Multiple Choice)
4.9/5
(32)
Key issues from a software security perspective are whether the
implemented algorithm correctly solves the specified problem,whether the machine instructions executed correctly represent the high level algorithm specification,and whether the manipulation of data values in variables is valid and meaningful.
(True/False)
4.7/5
(28)
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program,service,or function.
(Short Answer)
4.8/5
(33)
The correct implementation in the case of an atomic operation is to
test separately for the presence of the lockfile and to not always attempt to create it.
(True/False)
4.7/5
(37)
A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.
(Multiple Choice)
4.8/5
(35)
A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.
(Multiple Choice)
4.9/5
(30)
A difference between defensive programming and normal practices is
that everything is assumed.
(True/False)
4.8/5
(34)
A ________ is a pattern composed of a sequence of characters that describe allowable input variants.
(Multiple Choice)
4.8/5
(34)
Program input data may be broadly classified as textual or ______.
(Short Answer)
4.8/5
(34)
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
(Short Answer)
4.8/5
(28)
A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.
(Short Answer)
4.9/5
(40)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)