Exam 11: Software Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
There is a problem anticipating and testing for all potential types of
non-standard inputs that might be exploited by an attacker to subvert a program.
(True/False)
4.9/5
(28)
"Incorrect Calculation of Buffer Size" is in the __________ software error category.
(Multiple Choice)
4.8/5
(44)
To prevent XSS attacks any user supplied input should be examined
and any dangerous code removed or escaped to block its execution.
(True/False)
4.8/5
(29)
The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.
(Multiple Choice)
4.7/5
(40)
Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.
(Essay)
4.9/5
(37)
A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.
(Multiple Choice)
4.9/5
(43)
Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.
(Essay)
4.8/5
(39)
To counter XSS attacks a defensive programmer needs to explicitly
identify any assumptions as to the form of input and to verify that any
input data conform to those assumptions before any use of the data.
(True/False)
4.8/5
(34)
_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.
(Multiple Choice)
4.9/5
(49)
UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.
(Essay)
4.9/5
(40)
_________ attacks are most commonly seen in scripted Web applications.
(Essay)
4.8/5
(35)
A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.
(Multiple Choice)
4.7/5
(34)
The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.
(Essay)
4.8/5
(37)
Defensive programming requires a changed mindset to traditional
programming practices.
(True/False)
4.9/5
(31)
"Improper Access Control (Authorization)" is in the _________ software error category.
(Multiple Choice)
4.9/5
(38)
Defensive programming is sometimes referred to as _________.
(Multiple Choice)
4.8/5
(39)
Incorrect handling of program _______ is one of the most common failings in software security.
(Multiple Choice)
4.9/5
(44)
Key issues from a software security perspective are whether the
implemented algorithm correctly solves the specified problem,whether the machine instructions executed correctly represent the high level algorithm specification,and whether the manipulation of data values in variables is valid and meaningful.
(True/False)
4.9/5
(43)
Many computer security vulnerabilities result from poor programming
practices.
(True/False)
4.9/5
(43)
Software security is closely related to software quality and reliability.
(True/False)
4.7/5
(33)
Showing 21 - 40 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)