Exam 11: Software Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A difference between defensive programming and normal practices isthat everything is assumed.

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

False

"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

Insecure Interaction Between Components

Injection attacks variants can occur whenever one program invokes theservices of another program, service, or function and passes to itexternally sourced, potentially untrusted information without sufficientinspection and validation of it.

Free
(True/False)
4.7/5
(32)
Correct Answer:
Verified

True

__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser.

(Multiple Choice)
4.8/5
(24)

A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.

(Short Answer)
4.7/5
(43)

The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.

(Multiple Choice)
4.8/5
(38)

Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.

(Short Answer)
4.9/5
(39)

The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program, service, or function.

(Short Answer)
4.7/5
(33)

In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.

(Short Answer)
4.7/5
(24)

Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.

(Multiple Choice)
4.8/5
(29)

Many computer security vulnerabilities result from poor programmingpractices.

(True/False)
4.8/5
(37)

A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.

(Short Answer)
4.8/5
(41)

The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.

(Multiple Choice)
4.9/5
(38)

Software security is closely related to software quality and reliability.

(True/False)
4.8/5
(34)

Security flaws occur as a consequence of sufficient checking andvalidation of data and error codes in programs.

(True/False)
4.7/5
(35)

To counter XSS attacks a defensive programmer needs to explicitlyidentify any assumptions as to the form of input and to verify that anyinput data conform to those assumptions before any use of the data.

(True/False)
4.8/5
(39)

A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.

(Multiple Choice)
5.0/5
(34)

Without suitable synchronization of accesses it is possible that valuesmay be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.

(True/False)
4.7/5
(35)

The correct implementation in the case of an atomic operation is totest separately for the presence of the lockfile and to not always attempt to create it.

(True/False)
4.8/5
(29)

Defensive programming requires a changed mindset to traditionalprogramming practices.

(True/False)
4.9/5
(30)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)