Secure Programming Practices

Secure Programming Practices

University

23 Qs

quiz-placeholder

Similar activities

Basics of Python Programming Unit-1

Basics of Python Programming Unit-1

University - Professional Development

20 Qs

PYTHON ENCAPSULATION

PYTHON ENCAPSULATION

University

20 Qs

Python_2R

Python_2R

KG - Professional Development

20 Qs

икт на конец то бытты

икт на конец то бытты

University

23 Qs

Python Control Structures

Python Control Structures

University

20 Qs

Midterm_20250418

Midterm_20250418

University

20 Qs

OOPS quiz-1 PYTHON

OOPS quiz-1 PYTHON

University

19 Qs

OOPs in Python

OOPs in Python

University

20 Qs

Secure Programming Practices

Secure Programming Practices

Assessment

Quiz

Computers, Instructional Technology, Professional Development

University

Medium

Created by

Mohamed Ibrahim

Used 11+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?

All the above options

Read and write to memory at will  

Write only certain areas using tokens

Read certain memory areas using the %s token

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting the cookie flag to which of the following mode is a good programming practice?

Protected

Secure

Locked

Safe

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify the correct statement in the following:

B) Customer trust, reputation, financial, compliance, and privacy are the major reasons to implement a software security program.

C) To secure online data, build secure software.

A) Security is a technical problem and is the responsibility of the security manager.

D) All the above options  

E) A) and C)  

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Secure practices for access control include which of the following?

All the options 

Business workflow

Authorization on each request

Role-based access

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is not recommended to secure web applications against authenticated users?

Running the application with least privileges

Client-side data validation  

Filtering data with a default deny regular expression

Using parameterized queries to access a database

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the best approach to use when providing access to an SSO application in a portal?

Mandatory access control

Biometric access control

Role-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Exception Handling refers to:

During application execution, if certain special conditions are met, a specific subroutine 'exception handler' is called.

All the options 

Identifying all possible erroneous inputs, and managing how an application responds to them.

Commercial runtime environments that contain tools to record debugging information from memory at the time of the exception, to provide 'root-cause' analysis information later.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?