Filters
Question type

Study Flashcards

UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.

Correct Answer

verifed

verified

Incorrect handling of program _______ is one of the most common failings in software security.


A) lines
B) input
C) output
D) disciplines

Correct Answer

verifed

verified

Software security is closely related to software quality and reliability.

Correct Answer

verifed

verified

A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.


A) fuzzing
B) deadlock
C) memory injection
D) memory leak

Correct Answer

verifed

verified

_________ attacks are most commonly seen in scripted Web applications.

Correct Answer

verifed

verified

Cross-site...

View Answer

Key issues from a software security perspective are whether the implemented algorithm correctly solves the specified problem,whether the machine instructions executed correctly represent the high level algorithm specification,and whether the manipulation of data values in variables is valid and meaningful.

Correct Answer

verifed

verified

Defensive programming is sometimes referred to as _________.


A) variable programming
B) secure programming
C) interpretive programming
D) chroot programming

Correct Answer

verifed

verified

To prevent XSS attacks any user supplied input should be examined and any dangerous code removed or escaped to block its execution.

Correct Answer

verifed

verified

_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.


A) PHP attack
B) Format string injection attack
C) XSS attack
D) Injection attack

Correct Answer

verifed

verified

The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.


A) shell scripting
B) fuzzing
C) canonicalization
D) deadlocking

Correct Answer

verifed

verified

Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.

Correct Answer

verifed

verified

"Incorrect Calculation of Buffer Size" is in the __________ software error category.


A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components

Correct Answer

verifed

verified

Defensive programming requires a changed mindset to traditional programming practices.

Correct Answer

verifed

verified

Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.

Correct Answer

verifed

verified

A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.


A) command injection
B) SQL injection
C) code injection
D) PHP remote code injection

Correct Answer

verifed

verified

Many computer security vulnerabilities result from poor programming practices.

Correct Answer

verifed

verified

The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.

Correct Answer

verifed

verified

There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program.

Correct Answer

verifed

verified

"Improper Access Control (Authorization) " is in the _________ software error category.


A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components

Correct Answer

verifed

verified

To counter XSS attacks a defensive programmer needs to explicitly identify any assumptions as to the form of input and to verify that any input data conform to those assumptions before any use of the data.

Correct Answer

verifed

verified

Showing 21 - 40 of 43

Related Exams

Show Answer