Secure Programming Practices

Secure Programming Practices

University

23 Qs

quiz-placeholder

Similar activities

NACOS Kahoot Session II

NACOS Kahoot Session II

University

20 Qs

AKG 4

AKG 4

University - Professional Development

19 Qs

DWDM Unit1 Quiz

DWDM Unit1 Quiz

University

21 Qs

COA_QUIZ_UNIT I

COA_QUIZ_UNIT I

University

20 Qs

PTY 104 Piagets Theory of Cognitive Development

PTY 104 Piagets Theory of Cognitive Development

University - Professional Development

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

IT 101 - Quiz 3

IT 101 - Quiz 3

University

20 Qs

Secure Programming Practices

Secure Programming Practices

Assessment

Quiz

Computers, Instructional Technology, Professional Development

University

Practice Problem

Medium

Created by

Mohamed Ibrahim

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?

All the above options

Read and write to memory at will  

Write only certain areas using tokens

Read certain memory areas using the %s token

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting the cookie flag to which of the following mode is a good programming practice?

Protected

Secure

Locked

Safe

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify the correct statement in the following:

B) Customer trust, reputation, financial, compliance, and privacy are the major reasons to implement a software security program.

C) To secure online data, build secure software.

A) Security is a technical problem and is the responsibility of the security manager.

D) All the above options  

E) A) and C)  

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Secure practices for access control include which of the following?

All the options 

Business workflow

Authorization on each request

Role-based access

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is not recommended to secure web applications against authenticated users?

Running the application with least privileges

Client-side data validation  

Filtering data with a default deny regular expression

Using parameterized queries to access a database

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the best approach to use when providing access to an SSO application in a portal?

Mandatory access control

Biometric access control

Role-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Exception Handling refers to:

During application execution, if certain special conditions are met, a specific subroutine 'exception handler' is called.

All the options 

Identifying all possible erroneous inputs, and managing how an application responds to them.

Commercial runtime environments that contain tools to record debugging information from memory at the time of the exception, to provide 'root-cause' analysis information later.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?