Filters
Question type

Study Flashcards

If privileges are greater than those already available to the attacker the result is a _________.

Correct Answer

verifed

verified

privilege ...

View Answer

The process of transforming input data that involves replacing alternate, equivalent encodings by one common value is called _________.

Correct Answer

verifed

verified

Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.

Correct Answer

verifed

verified

UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.

Correct Answer

verifed

verified

"Improper Access Control (Authorization) " is in the _________ software errorcategory.


A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components

Correct Answer

verifed

verified

A ________ is a pattern composed of a sequence of characters that describe allowable input variants.


A) canonicalization
B) race condition
C) regular expression
D) shell script

Correct Answer

verifed

verified

To prevent XSS attacks any user supplied input should be examinedand any dangerous code removed or escaped to block its execution.

Correct Answer

verifed

verified

_________ attacks are most commonly seen in scripted Web applications.

Correct Answer

verifed

verified

Cross-site...

View Answer

Key issues from a software security perspective are whether theimplemented algorithm correctly solves the specified problem, whether the machine instructions executed correctly represent the high level algorithm specification, and whether the manipulation of data values in variables is valid and meaningful.

Correct Answer

verifed

verified

A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.


A) fuzzing
B) deadlock
C) memory injection
D) memory leak

Correct Answer

verifed

verified

Program input data may be broadly classified as textual or ______.

Correct Answer

verifed

verified

_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.


A) Deadlocks
B) Privileges
C) Environment variables
D) Race conditions

Correct Answer

verifed

verified

The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file, ensuring that each process has appropriate access in turn.


A) lock
B) code injection
C) chroot jail
D) privilege escalation

Correct Answer

verifed

verified

"Incorrect Calculation of Buffer Size" is in the __________ software error category.


A) Porous Defenses
B) Allocation of Resources
C) Risky Resource Management
D) Insecure Interaction Between Components

Correct Answer

verifed

verified

A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.

Correct Answer

verifed

verified

An ASCII character can be encoded as a 1 to 4 byte sequence usingthe UTF-8 encoding.

Correct Answer

verifed

verified

A _______ attack is where the input includes code that is then executed by the attacked system.


A) SQL injection
B) cross-site scripting
C) code injection
D) interpreter injection

Correct Answer

verifed

verified

The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.

Correct Answer

verifed

verified

Defensive programming is sometimes referred to as _________.


A) variable programming
B) secure programming
C) interpretive programming
D) chroot programming

Correct Answer

verifed

verified

Incorrect handling of program _______ is one of the most common failings insoftware security.


A) lines
B) input
C) output
D) disciplines

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer