Question
click below
click below
Question
Normal Size Small Size show me how
Computer Security-18
Chapter 18
Question | Answer |
---|---|
The______ is a linear software engineering model with no repeating steps. | Waterfall model |
____________________ cause an application to malfunction due to a misrepresented name for a resource. | Canonicalization errors |
Index overrun is example of a_____________ | Buffer overflow |
A series of repeating cycles ever increasing in developing functionality describes the ____________________. | Spiral model |
Replacing a SQL statement thru false input to a function is an example of_________ | Code injection |
Using an administrator level account for all functions is a violation of the principle of ____________________. | Least privilege |
The______________ is the first opportunity to address security functionality during a project | Requirements |
The ____________________ is the last opportunity to address security functionalitybefore shipping a product. | Testing phase |
A__________ is a defined set of validated inputs and outputs used to test a module for correct functionality. | Use Cases |
A random number suitable for an encryption function is called ____________________. | Cryptographically random |
Which of the following is not related to a buffer overflow? | Canonicalization |
Which of the following is not involved with a code injection error? | A pointer in the C language |
Input validation is important to prevent_________ | Buffer Overflow |
The term waterfall is associated with which of the following? | A software engineering process model |
is most important to define security requirements during___________ | The requirements phase of the project |
The largest class of errors in software engineering can be attributed to… | Buffer overflows |
The Morris worm exploited_________ | A buffer flow in UNIX. |
Least privilege applies to… | All resource requests from applications to other entities |
Common cryptographic failures include which of the following? | cryptographic sequence failures |
A cryptographically random number sequence is characterized by… | Intersequence randomness |
Testing is best accomplished____________ | After all code is finished |
Security requirements are best defined in… | The requirements phase |
Code review by a second party is helpful to_____________ | Catch errors early in the programming process |
Virus and worm propagation can be achieved through exploiting… | Buffer Overflows |
One of the most fundamental rules to good coding practice is___________ | Validate all imputs |