
Week 10 - Software security
Quiz
•
Arts
•
1st - 5th Grade
•
Practice Problem
•
Hard
Tze Tok
Used 5+ times
FREE Resource
Enhance your content in a minute
13 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the following(s) describes Command Injection
Exploiting the vulnerability of accepting unexpected user input
inserting new malicious code into a vulnerable application, which executes
Executing arbitrary commands in a system shell or other parts of the environment
To override original command, gain access to a system, obtain sensitive data
Answer explanation
Wrong option: Refers to code injection, not command injection
Code injection focuses on injecting code into a vulnerable application, not system
2.
FILL IN THE BLANK QUESTION
2 mins • 1 pt
Buffer overflow: A condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information. This holding area for the buffer is known as a ... ?
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the followings are techniques used in Good Programming practices to prevent command injection?
Secure programming - nothing is assumed
Use safe APIs instead of unsafe APIs
Proper input validation (black/whitelist)
Enable CORs to prevent malicious codes accessing unauthorized memory
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
strcpy(dest, src) is considered unsafe compared to its counterpart strncpy(dest, src, num). What does the parameter 'num' do?
It ensures that the char length is equal or smaller than num
It ensures that the char length is equal to num
It ensures that the char length is larger than num
It ensures that the address is num
Answer explanation
It ensures that the input does not overflow, thus making sure the char is equal or smaller than num
5.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Buffer overflow Counter measure: System supports
Which of the following are system support techniques
Immutable code and inexecutable data in the memory
Use memory safe languages
Address randomization when program is launched
Control flow integrity enforcements
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which system supports does this:
The OS has an ACL-like approach to specify whether bytes in a memory region can be read, written or executed
Immutable code and inexecutable data in the memory
Address randomization when a program is launched
Control flow integrity enforcement
Discretionary Access Control
7.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Memory safe languages have bult-in defense against memory errors because they have inbuilt interpreters. Which languages are NOT memory safe
C#
C++
C
Rust
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Bitmap v Vector Images
Quiz
•
KG - University
10 questions
Wandavision episode 1 quiz
Quiz
•
KG - Professional Dev...
11 questions
Prior knowledge/ provocations
Quiz
•
3rd Grade
15 questions
THE BEATLES
Quiz
•
3rd Grade
10 questions
Origami and craft material
Quiz
•
1st Grade
16 questions
Color Theory 2
Quiz
•
5th Grade
15 questions
Reading and reading Music
Quiz
•
3rd Grade
10 questions
Elements of Design
Quiz
•
5th - 6th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
