Deck 11: Software Security

ملء الشاشة (f)
exit full mode
سؤال
Many computer security vulnerabilities result from poor programming
practices.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
There is a problem anticipating and testing for all potential types of
non-standard inputs that might be exploited by an attacker to subvert a program.
سؤال
"Improper Access Control (Authorization)" is in the _________ software error category.

A)Porous Defenses
B)Allocation of Resources
C)Risky Resource Management
D)Insecure Interaction Between Components
سؤال
A difference between defensive programming and normal practices is
that everything is assumed.
سؤال
To counter XSS attacks a defensive programmer needs to explicitly
identify any assumptions as to the form of input and to verify that any
input data conform to those assumptions before any use of the data.
سؤال
The correct implementation in the case of an atomic operation is to
test separately for the presence of the lockfile and to not always attempt to create it.
سؤال
Defensive programming requires a changed mindset to traditional
programming practices.
سؤال
_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

A)PHP attack
B)Format string injection attack
C)XSS attack
D)Injection attack
سؤال
An ASCII character can be encoded as a 1 to 4 byte sequence using
the UTF-8 encoding.
سؤال
Incorrect handling of program _______ is one of the most common failings in software security.

A)lines
B)input
C)output
D)disciplines
سؤال
Security flaws occur as a consequence of sufficient checking and
validation of data and error codes in programs.
سؤال
Defensive programming is sometimes referred to as _________.

A)variable programming
B)secure programming
C)interpretive programming
D)chroot programming
سؤال
Programmers often make assumptions about the type of inputs a
program will receive.
سؤال
"Incorrect Calculation of Buffer Size" is in the __________ software error category.

A)Porous Defenses
B)Allocation of Resources
C)Risky Resource Management
D)Insecure Interaction Between Components
سؤال
Software security is closely related to software quality and reliability.
سؤال
Injection attacks variants can occur whenever one program invokes the
services of another program,service,or function and passes to it
externally sourced,potentially untrusted information without sufficient
inspection and validation of it.
سؤال
Cross-site scripting attacks attempt to bypass the browser's security
checks to gain elevated access privileges to sensitive data belonging to
another site.
سؤال
Without suitable synchronization of accesses it is possible that values
may be corrupted,or changes lost,due to over-lapping access,use,and replacement of shared values.
سؤال
Key issues from a software security perspective are whether the
implemented algorithm correctly solves the specified problem,whether the machine instructions executed correctly represent the high level algorithm specification,and whether the manipulation of data values in variables is valid and meaningful.
سؤال
To prevent XSS attacks any user supplied input should be examined
and any dangerous code removed or escaped to block its execution.
سؤال
A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.
سؤال
__________ programming is a form of design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of the software.
سؤال
The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.

A)shell scripting
B)fuzzing
C)canonicalization
D)deadlocking
سؤال
Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.
سؤال
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.

A)PHP remote code injection
B)mail injection
C)command injection
D)SQL injection
سؤال
A ________ is a pattern composed of a sequence of characters that describe allowable input variants.

A)canonicalization
B)race condition
C)regular expression
D)shell script
سؤال
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file,ensuring that each process has appropriate access in turn.

A)lock
B)code injection
C)chroot jail
D)privilege escalation
سؤال
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
سؤال
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program,service,or function.
سؤال
In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
سؤال
_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.

A)Deadlocks
B)Privileges
C)Environment variables
D)Race conditions
سؤال
"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.
سؤال
Program input data may be broadly classified as textual or ______.
سؤال
A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.
سؤال
The process of transforming input data that involves replacing alternate,equivalent encodings by one common value is called _________.
سؤال
Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.
سؤال
A _______ attack is where the input includes code that is then executed by the attacked system.

A)SQL injection
B)cross-site scripting
C)code injection
D)interpreter injection
سؤال
A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.

A)command injection
B)SQL injection
C)code injection
D)PHP remote code injection
سؤال
A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.

A)fuzzing
B)deadlock
C)memory injection
D)memory leak
سؤال
_________ attacks are most commonly seen in scripted Web applications.
سؤال
The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.
سؤال
UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.
سؤال
If privileges are greater than those already available to the attacker the result is a _________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/43
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Software Security
1
Many computer security vulnerabilities result from poor programming
practices.
True
2
There is a problem anticipating and testing for all potential types of
non-standard inputs that might be exploited by an attacker to subvert a program.
True
3
"Improper Access Control (Authorization)" is in the _________ software error category.

A)Porous Defenses
B)Allocation of Resources
C)Risky Resource Management
D)Insecure Interaction Between Components
A
4
A difference between defensive programming and normal practices is
that everything is assumed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
5
To counter XSS attacks a defensive programmer needs to explicitly
identify any assumptions as to the form of input and to verify that any
input data conform to those assumptions before any use of the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
6
The correct implementation in the case of an atomic operation is to
test separately for the presence of the lockfile and to not always attempt to create it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
7
Defensive programming requires a changed mindset to traditional
programming practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
8
_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

A)PHP attack
B)Format string injection attack
C)XSS attack
D)Injection attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
9
An ASCII character can be encoded as a 1 to 4 byte sequence using
the UTF-8 encoding.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
10
Incorrect handling of program _______ is one of the most common failings in software security.

A)lines
B)input
C)output
D)disciplines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
11
Security flaws occur as a consequence of sufficient checking and
validation of data and error codes in programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
12
Defensive programming is sometimes referred to as _________.

A)variable programming
B)secure programming
C)interpretive programming
D)chroot programming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
13
Programmers often make assumptions about the type of inputs a
program will receive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
14
"Incorrect Calculation of Buffer Size" is in the __________ software error category.

A)Porous Defenses
B)Allocation of Resources
C)Risky Resource Management
D)Insecure Interaction Between Components
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
15
Software security is closely related to software quality and reliability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
16
Injection attacks variants can occur whenever one program invokes the
services of another program,service,or function and passes to it
externally sourced,potentially untrusted information without sufficient
inspection and validation of it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
17
Cross-site scripting attacks attempt to bypass the browser's security
checks to gain elevated access privileges to sensitive data belonging to
another site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
18
Without suitable synchronization of accesses it is possible that values
may be corrupted,or changes lost,due to over-lapping access,use,and replacement of shared values.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
19
Key issues from a software security perspective are whether the
implemented algorithm correctly solves the specified problem,whether the machine instructions executed correctly represent the high level algorithm specification,and whether the manipulation of data values in variables is valid and meaningful.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
20
To prevent XSS attacks any user supplied input should be examined
and any dangerous code removed or escaped to block its execution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
21
A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
22
__________ programming is a form of design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of the software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
23
The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.

A)shell scripting
B)fuzzing
C)canonicalization
D)deadlocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
24
Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
25
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.

A)PHP remote code injection
B)mail injection
C)command injection
D)SQL injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
26
A ________ is a pattern composed of a sequence of characters that describe allowable input variants.

A)canonicalization
B)race condition
C)regular expression
D)shell script
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
27
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file,ensuring that each process has appropriate access in turn.

A)lock
B)code injection
C)chroot jail
D)privilege escalation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
28
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
29
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program,service,or function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
30
In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
31
_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.

A)Deadlocks
B)Privileges
C)Environment variables
D)Race conditions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
32
"Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
33
Program input data may be broadly classified as textual or ______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
34
A ________ occurs when multiple processes and threads compete to gain uncontrolled access to some resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
35
The process of transforming input data that involves replacing alternate,equivalent encodings by one common value is called _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
36
Two key areas of concern for any input are the _______ of the input and the meaning and interpretation of the input.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
37
A _______ attack is where the input includes code that is then executed by the attacked system.

A)SQL injection
B)cross-site scripting
C)code injection
D)interpreter injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
38
A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.

A)command injection
B)SQL injection
C)code injection
D)PHP remote code injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
39
A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________.

A)fuzzing
B)deadlock
C)memory injection
D)memory leak
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
40
_________ attacks are most commonly seen in scripted Web applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
41
The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
42
UNIX related systems provide the chroot system function to limit a program's view of the file system to just one carefully configured section that is known as a ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
43
If privileges are greater than those already available to the attacker the result is a _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.