Exam 11: Software Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Without suitable synchronization of accesses it is possible that values may be corrupted,or changes lost,due to over-lapping access,use, and replacement of shared values.

Free
(True/False)
4.7/5
(33)
Correct Answer:
Verified

True

Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.

Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
Verified

A

To counter XSS attacks a defensive programmer needs to explicitly identify any assumptions as to the form of input and to verify that any input data conform to those assumptions before any use of the data.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.

(Short Answer)
5.0/5
(44)

The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.

(Short Answer)
4.8/5
(39)

Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.

(True/False)
4.7/5
(36)

Programmers often make assumptions about the type of inputs a program will receive.

(True/False)
4.9/5
(27)

In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.

(Short Answer)
4.8/5
(39)

_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.

(Multiple Choice)
5.0/5
(28)

__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser.

(Multiple Choice)
4.9/5
(32)

Key issues from a software security perspective are whether the implemented algorithm correctly solves the specified problem,whether the machine instructions executed correctly represent the high level algorithm specification,and whether the manipulation of data values in variables is valid and meaningful.

(True/False)
4.7/5
(28)

The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program,service,or function.

(Short Answer)
4.8/5
(33)

The correct implementation in the case of an atomic operation is to test separately for the presence of the lockfile and to not always attempt to create it.

(True/False)
4.7/5
(37)

A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.

(Multiple Choice)
4.8/5
(35)

A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.

(Multiple Choice)
4.9/5
(30)

A difference between defensive programming and normal practices is that everything is assumed.

(True/False)
4.8/5
(34)

A ________ is a pattern composed of a sequence of characters that describe allowable input variants.

(Multiple Choice)
4.8/5
(34)

Program input data may be broadly classified as textual or ______.

(Short Answer)
4.8/5
(34)

A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.

(Short Answer)
4.8/5
(28)

A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.

(Short Answer)
4.9/5
(40)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)