Search Header Logo

Secure Programming Practices

Authored by Mohamed Ibrahim

Computers, Instructional Technology, Professional Development

University

Used 11+ times

Secure Programming Practices
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?

All the above options

Read and write to memory at will  

Write only certain areas using tokens

Read certain memory areas using the %s token

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting the cookie flag to which of the following mode is a good programming practice?

Protected

Secure

Locked

Safe

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify the correct statement in the following:

B) Customer trust, reputation, financial, compliance, and privacy are the major reasons to implement a software security program.

C) To secure online data, build secure software.

A) Security is a technical problem and is the responsibility of the security manager.

D) All the above options  

E) A) and C)  

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Secure practices for access control include which of the following?

All the options 

Business workflow

Authorization on each request

Role-based access

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is not recommended to secure web applications against authenticated users?

Running the application with least privileges

Client-side data validation  

Filtering data with a default deny regular expression

Using parameterized queries to access a database

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the best approach to use when providing access to an SSO application in a portal?

Mandatory access control

Biometric access control

Role-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Exception Handling refers to:

During application execution, if certain special conditions are met, a specific subroutine 'exception handler' is called.

All the options 

Identifying all possible erroneous inputs, and managing how an application responds to them.

Commercial runtime environments that contain tools to record debugging information from memory at the time of the exception, to provide 'root-cause' analysis information later.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers