Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice Study Set 2
Quiz 11: Software Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
To prevent XSS attacks any user supplied input should be examinedand any dangerous code removed or escaped to block its execution.
Question 2
True/False
The correct implementation in the case of an atomic operation is totest separately for the presence of the lockfile and to not always attempt to create it.
Question 3
True/False
Many computer security vulnerabilities result from poor programmingpractices.
Question 4
True/False
There is a problem anticipating and testing for all potential types ofnon-standard inputs that might be exploited by an attacker to subvert a program.
Question 5
True/False
An ASCII character can be encoded as a 1 to 4 byte sequence usingthe UTF-8 encoding.
Question 6
True/False
A difference between defensive programming and normal practices isthat everything is assumed.
Question 7
True/False
Without suitable synchronization of accesses it is possible that valuesmay be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.
Question 8
True/False
Defensive programming requires a changed mindset to traditionalprogramming practices.
Question 9
Multiple Choice
_________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.
Question 10
True/False
Cross-site scripting attacks attempt to bypass the browser's securitychecks to gain elevated access privileges to sensitive data belonging toanother site.
Question 11
True/False
To counter XSS attacks a defensive programmer needs to explicitlyidentify any assumptions as to the form of input and to verify that anyinput data conform to those assumptions before any use of the data.
Question 12
True/False
Key issues from a software security perspective are whether theimplemented algorithm correctly solves the specified problem, whether the machine instructions executed correctly represent the high level algorithm specification, and whether the manipulation of data values in variables is valid and meaningful.
Question 13
Multiple Choice
Incorrect handling of program _______ is one of the most common failings insoftware security.
Question 14
True/False
Security flaws occur as a consequence of sufficient checking andvalidation of data and error codes in programs.
Question 15
Multiple Choice
"Improper Access Control (Authorization) " is in the _________ software errorcategory.
Question 16
True/False
Injection attacks variants can occur whenever one program invokes theservices of another program, service, or function and passes to itexternally sourced, potentially untrusted information without sufficientinspection and validation of it.