click below
click below
Normal Size Small Size show me how
Computer Security-18
Chapter 18
| Question | Answer |
|---|---|
| The______ is a linear software engineering model with no repeating steps. | Waterfall model |
| ____________________ cause an application to malfunction due to a misrepresented name for a resource. | Canonicalization errors |
| Index overrun is example of a_____________ | Buffer overflow |
| A series of repeating cycles ever increasing in developing functionality describes the ____________________. | Spiral model |
| Replacing a SQL statement thru false input to a function is an example of_________ | Code injection |
| Using an administrator level account for all functions is a violation of the principle of ____________________. | Least privilege |
| The______________ is the first opportunity to address security functionality during a project | Requirements |
| The ____________________ is the last opportunity to address security functionalitybefore shipping a product. | Testing phase |
| A__________ is a defined set of validated inputs and outputs used to test a module for correct functionality. | Use Cases |
| A random number suitable for an encryption function is called ____________________. | Cryptographically random |
| Which of the following is not related to a buffer overflow? | Canonicalization |
| Which of the following is not involved with a code injection error? | A pointer in the C language |
| Input validation is important to prevent_________ | Buffer Overflow |
| The term waterfall is associated with which of the following? | A software engineering process model |
| is most important to define security requirements during___________ | The requirements phase of the project |
| The largest class of errors in software engineering can be attributed to… | Buffer overflows |
| The Morris worm exploited_________ | A buffer flow in UNIX. |
| Least privilege applies to… | All resource requests from applications to other entities |
| Common cryptographic failures include which of the following? | cryptographic sequence failures |
| A cryptographically random number sequence is characterized by… | Intersequence randomness |
| Testing is best accomplished____________ | After all code is finished |
| Security requirements are best defined in… | The requirements phase |
| Code review by a second party is helpful to_____________ | Catch errors early in the programming process |
| Virus and worm propagation can be achieved through exploiting… | Buffer Overflows |
| One of the most fundamental rules to good coding practice is___________ | Validate all imputs |