Week 10 - Software security

Week 10 - Software security

1st - 5th Grade

13 Qs

quiz-placeholder

Similar activities

Check Music WC 15th June 2020 Year 8

Check Music WC 15th June 2020 Year 8

KG - 12th Grade

11 Qs

KSS Rhythm

KSS Rhythm

1st - 5th Grade

10 Qs

NEP 2020

NEP 2020

1st - 5th Grade

13 Qs

Do You Even Opera, Bro?!

Do You Even Opera, Bro?!

4th - 6th Grade

15 Qs

5º DISCOVER MUSIC. UNIT 5 (BLUES AND JAZZ)

5º DISCOVER MUSIC. UNIT 5 (BLUES AND JAZZ)

5th Grade

10 Qs

arts

arts

4th - 6th Grade

10 Qs

TEMPO, TEXTURE & HARMONY

TEMPO, TEXTURE & HARMONY

4th Grade

16 Qs

Elements of Art

Elements of Art

3rd - 6th Grade

10 Qs

Week 10 - Software security

Week 10 - Software security

Assessment

Quiz

Arts

1st - 5th Grade

Practice Problem

Hard

Created by

Tze Tok

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following(s) describes Command Injection

Exploiting the vulnerability of accepting unexpected user input

inserting new malicious code into a vulnerable application, which executes

Executing arbitrary commands in a system shell or other parts of the environment

To override original command, gain access to a system, obtain sensitive data

Answer explanation

Wrong option: Refers to code injection, not command injection

Code injection focuses on injecting code into a vulnerable application, not system

2.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

Buffer overflow: A condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information. This holding area for the buffer is known as a ... ?

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the followings are techniques used in Good Programming practices to prevent command injection?

Secure programming - nothing is assumed

Use safe APIs instead of unsafe APIs

Proper input validation (black/whitelist)

Enable CORs to prevent malicious codes accessing unauthorized memory

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

strcpy(dest, src) is considered unsafe compared to its counterpart strncpy(dest, src, num). What does the parameter 'num' do?

It ensures that the char length is equal or smaller than num

It ensures that the char length is equal to num

It ensures that the char length is larger than num

It ensures that the address is num

Answer explanation

It ensures that the input does not overflow, thus making sure the char is equal or smaller than num

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Buffer overflow Counter measure: System supports

Which of the following are system support techniques

Immutable code and inexecutable data in the memory

Use memory safe languages

Address randomization when program is launched

Control flow integrity enforcements

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which system supports does this:

The OS has an ACL-like approach to specify whether bytes in a memory region can be read, written or executed

Immutable code and inexecutable data in the memory

Address randomization when a program is launched

Control flow integrity enforcement

Discretionary Access Control

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Memory safe languages have bult-in defense against memory errors because they have inbuilt interpreters. Which languages are NOT memory safe

C#

C++

C

Rust

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?