Exam 11: Software Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.

(Short Answer)
5.0/5
(41)

Incorrect handling of program _______ is one of the most common failings in software security.

(Multiple Choice)
4.9/5
(38)

A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.

(Short Answer)
4.9/5
(46)

Software security is closely related to software quality and reliability.

(True/False)
4.7/5
(38)

A _______ attack is where the input includes code that is then executed by the attacked system.

(Multiple Choice)
4.8/5
(31)

Defensive programming is sometimes referred to as _________.

(Multiple Choice)
4.8/5
(39)

Cross-site scripting attacks attempt to bypass the browser's security checks to gain elevated access privileges to sensitive data belonging to another site.

(True/False)
4.9/5
(46)

The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.

(Multiple Choice)
4.8/5
(40)

_________ attacks are most commonly seen in scripted Web applications.

(Short Answer)
4.9/5
(32)

"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.

(Short Answer)
4.9/5
(37)

__________ programming is a form of design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of the software.

(Short Answer)
4.9/5
(28)

An ASCII character can be encoded as a 1 to 4 byte sequence using the UTF-8 encoding.

(True/False)
4.9/5
(38)

"Improper Access Control (Authorization)" is in the _________ software error category.

(Multiple Choice)
4.9/5
(29)

The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.

(Multiple Choice)
4.9/5
(29)

Many computer security vulnerabilities result from poor programming practices.

(True/False)
4.8/5
(40)

_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

(Multiple Choice)
4.8/5
(29)

Defensive programming requires a changed mindset to traditional programming practices.

(True/False)
4.8/5
(35)

If privileges are greater than those already available to the attacker the result is a _________.

(Short Answer)
4.9/5
(32)

To prevent XSS attacks any user supplied input should be examined and any dangerous code removed or escaped to block its execution.

(True/False)
4.9/5
(35)

The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file,ensuring that each process has appropriate access in turn.

(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)