Exam 11: Software Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The correct implementation in the case of an atomic operation is to test separately for the presence of the lockfile and to not always attempt to create it.

Free
(True/False)
4.7/5
(32)
Correct Answer:
Verified

False

If privileges are greater than those already available to the attacker the result is a _________.

Free
(Essay)
4.8/5
(40)
Correct Answer:
Verified

privilege escalation

A _______ attack is where the input includes code that is then executed by the attacked system.

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

C

In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.

(Essay)
4.9/5
(29)

Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.

(Multiple Choice)
4.7/5
(26)

Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.

(True/False)
4.8/5
(40)

A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.

(Essay)
4.9/5
(37)

A ________ is a pattern composed of a sequence of characters that describe allowable input variants.

(Multiple Choice)
4.8/5
(36)

The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file,ensuring that each process has appropriate access in turn.

(Multiple Choice)
5.0/5
(26)

The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program,service,or function.

(Essay)
4.9/5
(38)

Injection attacks variants can occur whenever one program invokes the services of another program,service,or function and passes to it externally sourced,potentially untrusted information without sufficient inspection and validation of it.

(True/False)
4.8/5
(37)

The process of transforming input data that involves replacing alternate,equivalent encodings by one common value is called _________.

(Essay)
4.9/5
(40)

"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.

(Essay)
4.8/5
(34)

A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.

(Essay)
4.7/5
(40)

An ASCII character can be encoded as a 1 to 4 byte sequence using the UTF-8 encoding.

(True/False)
4.7/5
(37)

Cross-site scripting attacks attempt to bypass the browser's security checks to gain elevated access privileges to sensitive data belonging to another site.

(True/False)
4.7/5
(33)

Program input data may be broadly classified as textual or ______.

(Essay)
5.0/5
(26)

Programmers often make assumptions about the type of inputs a program will receive.

(True/False)
4.8/5
(41)

_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.

(Multiple Choice)
4.8/5
(39)

A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.

(Essay)
4.8/5
(36)
Showing 1 - 20 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)