Exam 11: Software Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.
(Short Answer)
5.0/5
(41)
Incorrect handling of program _______ is one of the most common failings in software security.
(Multiple Choice)
4.9/5
(38)
A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.
(Short Answer)
4.9/5
(46)
Software security is closely related to software quality and reliability.
(True/False)
4.7/5
(38)
A _______ attack is where the input includes code that is then executed by the attacked system.
(Multiple Choice)
4.8/5
(31)
Defensive programming is sometimes referred to as _________.
(Multiple Choice)
4.8/5
(39)
Cross-site scripting attacks attempt to bypass the browser's security
checks to gain elevated access privileges to sensitive data belonging to
another site.
(True/False)
4.9/5
(46)
The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.
(Multiple Choice)
4.8/5
(40)
_________ attacks are most commonly seen in scripted Web applications.
(Short Answer)
4.9/5
(32)
"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.
(Short Answer)
4.9/5
(37)
__________ programming is a form of design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of the software.
(Short Answer)
4.9/5
(28)
An ASCII character can be encoded as a 1 to 4 byte sequence using
the UTF-8 encoding.
(True/False)
4.9/5
(38)
"Improper Access Control (Authorization)" is in the _________ software error category.
(Multiple Choice)
4.9/5
(29)
The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.
(Multiple Choice)
4.9/5
(29)
Many computer security vulnerabilities result from poor programming
practices.
(True/False)
4.8/5
(40)
_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.
(Multiple Choice)
4.8/5
(29)
Defensive programming requires a changed mindset to traditional
programming practices.
(True/False)
4.8/5
(35)
If privileges are greater than those already available to the attacker the result is a _________.
(Short Answer)
4.9/5
(32)
To prevent XSS attacks any user supplied input should be examined
and any dangerous code removed or escaped to block its execution.
(True/False)
4.9/5
(35)
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file,ensuring that each process has appropriate access in turn.
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)