Deck 11: Software Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 11: Software Security
1
To prevent XSS attacks any user supplied input should be examinedand any dangerous code removed or escaped to block its execution.
True
2
The correct implementation in the case of an atomic operation is totest separately for the presence of the lockfile and to not always attempt to create it.
False
3
Many computer security vulnerabilities result from poor programmingpractices.
True
4
There is a problem anticipating and testing for all potential types ofnon-standard inputs that might be exploited by an attacker to subvert a program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
An ASCII character can be encoded as a 1 to 4 byte sequence usingthe UTF-8 encoding.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
A difference between defensive programming and normal practices isthat everything is assumed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Without suitable synchronization of accesses it is possible that valuesmay be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Defensive programming requires a changed mindset to traditionalprogramming practices.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.
A) PHP attack
B) Format string injection attack
C) XSS attack
D) Injection attack
A) PHP attack
B) Format string injection attack
C) XSS attack
D) Injection attack
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Cross-site scripting attacks attempt to bypass the browser's securitychecks to gain elevated access privileges to sensitive data belonging toanother site.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
To counter XSS attacks a defensive programmer needs to explicitlyidentify any assumptions as to the form of input and to verify that anyinput data conform to those assumptions before any use of the data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Key issues from a software security perspective are whether theimplemented algorithm correctly solves the specified problem, whether the machine instructions executed correctly represent the high level algorithm specification, and whether the manipulation of data values in variables is valid and meaningful.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Incorrect handling of program _______ is one of the most common failings insoftware security.
A) lines
B) input
C) output
D) disciplines
A) lines
B) input
C) output
D) disciplines
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Security flaws occur as a consequence of sufficient checking andvalidation of data and error codes in programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
"Improper Access Control (Authorization)" is in the _________ software errorcategory.
A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components
A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Injection attacks variants can occur whenever one program invokes theservices of another program, service, or function and passes to itexternally sourced, potentially untrusted information without sufficientinspection and validation of it.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Defensive programming is sometimes referred to as _________.
A) variable programming
B) secure programming
C) interpretive programming
D) chroot programming
A) variable programming
B) secure programming
C) interpretive programming
D) chroot programming
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
"Incorrect Calculation of Buffer Size" is in the __________ software error category.
A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components
A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Software security is closely related to software quality and reliability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Programmers often make assumptions about the type of inputs aprogram will receive.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The process of transforming input data that involves replacing alternate, equivalent encodings by one common value is called _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser.
A) PHP file inclusion
B) Mail injection
C) Code injection
D) Cross-site scripting
A) PHP file inclusion
B) Mail injection
C) Code injection
D) Cross-site scripting
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A _______ attack is where the input includes code that is then executed by the attacked system.
A) SQL injection
B) cross-site scripting
C) code injection
D) interpreter injection
A) SQL injection
B) cross-site scripting
C) code injection
D) interpreter injection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
_________ attacks are most commonly seen in scripted Web applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Program input data may be broadly classified as textual or ______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.
A) PHP remote code injection
B) mail injection
C) command injection
D) SQL injection
A) PHP remote code injection
B) mail injection
C) command injection
D) SQL injection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.
A) XSS reflection
B) chroot jail
C) atomic bomb
D) PHP file inclusion
A) XSS reflection
B) chroot jail
C) atomic bomb
D) PHP file inclusion
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file, ensuring that each process has appropriate access in turn.
A) lock
B) code injection
C) chroot jail
D) privilege escalation
A) lock
B) code injection
C) chroot jail
D) privilege escalation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.
A) shell scripting
B) fuzzing
C) canonicalization
D) deadlocking
A) shell scripting
B) fuzzing
C) canonicalization
D) deadlocking
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.
A) Deadlocks
B) Privileges
C) Environment variables
D) Race conditions
A) Deadlocks
B) Privileges
C) Environment variables
D) Race conditions
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ programming is a form of design intended to ensure the continuing function of a piece of software despite unforeseeable usage of the software.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ is a pattern composed of a sequence of characters that describe allowable input variants.
A) canonicalization
B) race condition
C) regular expression
D) shell script
A) canonicalization
B) race condition
C) regular expression
D) shell script
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.
A) command injection
B) SQL injection
C) code injection
D) PHP remote code injection
A) command injection
B) SQL injection
C) code injection
D) PHP remote code injection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.
A) fuzzing
B) deadlock
C) memory injection
D) memory leak
A) fuzzing
B) deadlock
C) memory injection
D) memory leak
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
If privileges are greater than those already available to the attacker the result is a _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program, service, or function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck