Exam 11: Software Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program.

(True/False)
4.9/5
(28)

"Incorrect Calculation of Buffer Size" is in the __________ software error category.

(Multiple Choice)
4.8/5
(44)

To prevent XSS attacks any user supplied input should be examined and any dangerous code removed or escaped to block its execution.

(True/False)
4.8/5
(29)

The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.

(Multiple Choice)
4.7/5
(40)

Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.

(Essay)
4.9/5
(37)

A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.

(Multiple Choice)
4.9/5
(43)

Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.

(Essay)
4.8/5
(39)

To counter XSS attacks a defensive programmer needs to explicitly identify any assumptions as to the form of input and to verify that any input data conform to those assumptions before any use of the data.

(True/False)
4.8/5
(34)

_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

(Multiple Choice)
4.9/5
(49)

UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.

(Essay)
4.9/5
(40)

_________ attacks are most commonly seen in scripted Web applications.

(Essay)
4.8/5
(35)

A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.

(Multiple Choice)
4.7/5
(34)

The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.

(Essay)
4.8/5
(37)

Defensive programming requires a changed mindset to traditional programming practices.

(True/False)
4.9/5
(31)

"Improper Access Control (Authorization)" is in the _________ software error category.

(Multiple Choice)
4.9/5
(38)

Defensive programming is sometimes referred to as _________.

(Multiple Choice)
4.8/5
(39)

Incorrect handling of program _______ is one of the most common failings in software security.

(Multiple Choice)
4.9/5
(44)

Key issues from a software security perspective are whether the implemented algorithm correctly solves the specified problem,whether the machine instructions executed correctly represent the high level algorithm specification,and whether the manipulation of data values in variables is valid and meaningful.

(True/False)
4.9/5
(43)

Many computer security vulnerabilities result from poor programming practices.

(True/False)
4.9/5
(43)

Software security is closely related to software quality and reliability.

(True/False)
4.7/5
(33)
Showing 21 - 40 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)