Secure Programming Practices

Secure Programming Practices

University

23 Qs

quiz-placeholder

Similar activities

Django-quiz

Django-quiz

5th Grade - University

20 Qs

Uji Pengetahuan Jaringan Komputer

Uji Pengetahuan Jaringan Komputer

9th Grade - University

20 Qs

DSA Quest 1.0

DSA Quest 1.0

University

19 Qs

Lesson 3 (Model Training)

Lesson 3 (Model Training)

University

20 Qs

First Quiz Interactive Designing

First Quiz Interactive Designing

University

20 Qs

ISFIS123 - MIDTERM EXAM

ISFIS123 - MIDTERM EXAM

University

20 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

Multimedia Video & Animation

Multimedia Video & Animation

University

20 Qs

Secure Programming Practices

Secure Programming Practices

Assessment

Quiz

Computers, Instructional Technology, Professional Development

University

Practice Problem

Medium

Created by

Mohamed Ibrahim

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?

All the above options

Read and write to memory at will  

Write only certain areas using tokens

Read certain memory areas using the %s token

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting the cookie flag to which of the following mode is a good programming practice?

Protected

Secure

Locked

Safe

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify the correct statement in the following:

B) Customer trust, reputation, financial, compliance, and privacy are the major reasons to implement a software security program.

C) To secure online data, build secure software.

A) Security is a technical problem and is the responsibility of the security manager.

D) All the above options  

E) A) and C)  

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Secure practices for access control include which of the following?

All the options 

Business workflow

Authorization on each request

Role-based access

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is not recommended to secure web applications against authenticated users?

Running the application with least privileges

Client-side data validation  

Filtering data with a default deny regular expression

Using parameterized queries to access a database

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the best approach to use when providing access to an SSO application in a portal?

Mandatory access control

Biometric access control

Role-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Exception Handling refers to:

During application execution, if certain special conditions are met, a specific subroutine 'exception handler' is called.

All the options 

Identifying all possible erroneous inputs, and managing how an application responds to them.

Commercial runtime environments that contain tools to record debugging information from memory at the time of the exception, to provide 'root-cause' analysis information later.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?