Filters
Question type

Study Flashcards

The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.


A) XSS reflection
B) chroot jail
C) atomic bomb
D) PHP file inclusion

Correct Answer

verifed

verified

A difference between defensive programming and normal practices isthat everything is assumed.

Correct Answer

verifed

verified

False

A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.

Correct Answer

verifed

verified

Without suitable synchronization of accesses it is possible that valuesmay be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.

Correct Answer

verifed

verified

__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser.


A) PHP file inclusion
B) Mail injection
C) Code injection
D) Cross-site scripting

Correct Answer

verifed

verified

A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.


A) command injection
B) SQL injection
C) code injection
D) PHP remote code injection

Correct Answer

verifed

verified

Many computer security vulnerabilities result from poor programmingpractices.

Correct Answer

verifed

verified

Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.


A) PHP remote code injection
B) mail injection
C) command injection
D) SQL injection

Correct Answer

verifed

verified

The correct implementation in the case of an atomic operation is totest separately for the presence of the lockfile and to not always attempt to create it.

Correct Answer

verifed

verified

Security flaws occur as a consequence of sufficient checking andvalidation of data and error codes in programs.

Correct Answer

verifed

verified

In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.

Correct Answer

verifed

verified

The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.


A) shell scripting
B) fuzzing
C) canonicalization
D) deadlocking

Correct Answer

verifed

verified

"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.

Correct Answer

verifed

verified

Insecure Interaction Between Components

Defensive programming requires a changed mindset to traditionalprogramming practices.

Correct Answer

verifed

verified

Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.

Correct Answer

verifed

verified

The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program, service, or function.

Correct Answer

verifed

verified

To counter XSS attacks a defensive programmer needs to explicitlyidentify any assumptions as to the form of input and to verify that anyinput data conform to those assumptions before any use of the data.

Correct Answer

verifed

verified

Software security is closely related to software quality and reliability.

Correct Answer

verifed

verified

Injection attacks variants can occur whenever one program invokes theservices of another program, service, or function and passes to itexternally sourced, potentially untrusted information without sufficientinspection and validation of it.

Correct Answer

verifed

verified

True

A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer