Exam 11: Software Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The correct implementation in the case of an atomic operation is to
test separately for the presence of the lockfile and to not always attempt to create it.
Free
(True/False)
4.7/5
(32)
Correct Answer:
False
If privileges are greater than those already available to the attacker the result is a _________.
Free
(Essay)
4.8/5
(40)
Correct Answer:
privilege escalation
A _______ attack is where the input includes code that is then executed by the attacked system.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
C
In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
(Essay)
4.9/5
(29)
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.
(Multiple Choice)
4.7/5
(26)
Security flaws occur as a consequence of sufficient checking and
validation of data and error codes in programs.
(True/False)
4.8/5
(40)
A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.
(Essay)
4.9/5
(37)
A ________ is a pattern composed of a sequence of characters that describe allowable input variants.
(Multiple Choice)
4.8/5
(36)
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file,ensuring that each process has appropriate access in turn.
(Multiple Choice)
5.0/5
(26)
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program,service,or function.
(Essay)
4.9/5
(38)
Injection attacks variants can occur whenever one program invokes the
services of another program,service,or function and passes to it
externally sourced,potentially untrusted information without sufficient
inspection and validation of it.
(True/False)
4.8/5
(37)
The process of transforming input data that involves replacing alternate,equivalent encodings by one common value is called _________.
(Essay)
4.9/5
(40)
"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.
(Essay)
4.8/5
(34)
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
(Essay)
4.7/5
(40)
An ASCII character can be encoded as a 1 to 4 byte sequence using
the UTF-8 encoding.
(True/False)
4.7/5
(37)
Cross-site scripting attacks attempt to bypass the browser's security
checks to gain elevated access privileges to sensitive data belonging to
another site.
(True/False)
4.7/5
(33)
Programmers often make assumptions about the type of inputs a
program will receive.
(True/False)
4.8/5
(41)
_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.
(Multiple Choice)
4.8/5
(39)
A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.
(Essay)
4.8/5
(36)
Showing 1 - 20 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)