Exam 11: Software Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A difference between defensive programming and normal practices isthat everything is assumed.
Free
(True/False)
4.7/5
(34)
Correct Answer:
False
"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.
Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Insecure Interaction Between Components
Injection attacks variants can occur whenever one program invokes theservices of another program, service, or function and passes to itexternally sourced, potentially untrusted information without sufficientinspection and validation of it.
Free
(True/False)
4.7/5
(32)
Correct Answer:
True
__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser.
(Multiple Choice)
4.8/5
(24)
A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.
(Short Answer)
4.7/5
(43)
The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.
(Multiple Choice)
4.8/5
(38)
Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.
(Short Answer)
4.9/5
(39)
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program, service, or function.
(Short Answer)
4.7/5
(33)
In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
(Short Answer)
4.7/5
(24)
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.
(Multiple Choice)
4.8/5
(29)
Many computer security vulnerabilities result from poor programmingpractices.
(True/False)
4.8/5
(37)
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
(Short Answer)
4.8/5
(41)
The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.
(Multiple Choice)
4.9/5
(38)
Software security is closely related to software quality and reliability.
(True/False)
4.8/5
(34)
Security flaws occur as a consequence of sufficient checking andvalidation of data and error codes in programs.
(True/False)
4.7/5
(35)
To counter XSS attacks a defensive programmer needs to explicitlyidentify any assumptions as to the form of input and to verify that anyinput data conform to those assumptions before any use of the data.
(True/False)
4.8/5
(39)
A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.
(Multiple Choice)
5.0/5
(34)
Without suitable synchronization of accesses it is possible that valuesmay be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.
(True/False)
4.7/5
(35)
The correct implementation in the case of an atomic operation is totest separately for the presence of the lockfile and to not always attempt to create it.
(True/False)
4.8/5
(29)
Defensive programming requires a changed mindset to traditionalprogramming practices.
(True/False)
4.9/5
(30)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)