Computer Security-18 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| The______ is a linear software engineering model with no repeating steps. | Waterfall model |
| ____________________ cause an application to malfunction due to a misrepresented name for a resource. | Canonicalization errors |
| Index overrun is example of a_____________ | Buffer overflow |
| A series of repeating cycles ever increasing in developing functionality describes the ____________________. | Spiral model |
| Replacing a SQL statement thru false input to a function is an example of_________ | Code injection |
| Using an administrator level account for all functions is a violation of the principle of ____________________. | Least privilege |
| The______________ is the first opportunity to address security functionality during a project | Requirements |
| The ____________________ is the last opportunity to address security functionalitybefore shipping a product. | Testing phase |
| A__________ is a defined set of validated inputs and outputs used to test a module for correct functionality. | Use Cases |
| A random number suitable for an encryption function is called ____________________. | Cryptographically random |
| Which of the following is not related to a buffer overflow? | Canonicalization |
| Which of the following is not involved with a code injection error? | A pointer in the C language |
| Input validation is important to prevent_________ | Buffer Overflow |
| The term waterfall is associated with which of the following? | A software engineering process model |
| is most important to define security requirements during___________ | The requirements phase of the project |
| The largest class of errors in software engineering can be attributed to… | Buffer overflows |
| The Morris worm exploited_________ | A buffer flow in UNIX. |
| Least privilege applies to… | All resource requests from applications to other entities |
| Common cryptographic failures include which of the following? | cryptographic sequence failures |
| A cryptographically random number sequence is characterized by… | Intersequence randomness |
| Testing is best accomplished____________ | After all code is finished |
| Security requirements are best defined in… | The requirements phase |
| Code review by a second party is helpful to_____________ | Catch errors early in the programming process |
| Virus and worm propagation can be achieved through exploiting… | Buffer Overflows |
| One of the most fundamental rules to good coding practice is___________ | Validate all imputs |
Created by:
ryanparnelltcc1