Multiple Choice
A lack of input validation vulnerability refers to a situation where
A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
Correct Answer:

Verified
Correct Answer:
Verified
Q12: Controls are<br>A) Safeguards used to minimize the
Q13: Rootkits are<br>A) Software used to hide the
Q14: Zero-day exploits are<br>A) Software used to hide
Q15: As reported in the chapter, recent trends
Q16: Vulnerabilities are<br>A) Safeguards used to minimize the
Q18: Phishing refers to<br>A) Programs that propagate through
Q19: A SQL injection vulnerability is an example
Q20: Zeus and Spyeye are examples of<br>A) Viruses<br>B)
Q21: The CVE list is<br>A) A list of
Q22: An unrestricted uploads vulnerability refers to a