
Week 10 - Software security
Quiz
•
Arts
•
1st - 5th Grade
•
Practice Problem
•
Hard
Tze Tok
Used 5+ times
FREE Resource
Enhance your content in a minute
13 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the following(s) describes Command Injection
Exploiting the vulnerability of accepting unexpected user input
inserting new malicious code into a vulnerable application, which executes
Executing arbitrary commands in a system shell or other parts of the environment
To override original command, gain access to a system, obtain sensitive data
Answer explanation
Wrong option: Refers to code injection, not command injection
Code injection focuses on injecting code into a vulnerable application, not system
2.
FILL IN THE BLANK QUESTION
2 mins • 1 pt
Buffer overflow: A condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information. This holding area for the buffer is known as a ... ?
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the followings are techniques used in Good Programming practices to prevent command injection?
Secure programming - nothing is assumed
Use safe APIs instead of unsafe APIs
Proper input validation (black/whitelist)
Enable CORs to prevent malicious codes accessing unauthorized memory
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
strcpy(dest, src) is considered unsafe compared to its counterpart strncpy(dest, src, num). What does the parameter 'num' do?
It ensures that the char length is equal or smaller than num
It ensures that the char length is equal to num
It ensures that the char length is larger than num
It ensures that the address is num
Answer explanation
It ensures that the input does not overflow, thus making sure the char is equal or smaller than num
5.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Buffer overflow Counter measure: System supports
Which of the following are system support techniques
Immutable code and inexecutable data in the memory
Use memory safe languages
Address randomization when program is launched
Control flow integrity enforcements
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which system supports does this:
The OS has an ACL-like approach to specify whether bytes in a memory region can be read, written or executed
Immutable code and inexecutable data in the memory
Address randomization when a program is launched
Control flow integrity enforcement
Discretionary Access Control
7.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Memory safe languages have bult-in defense against memory errors because they have inbuilt interpreters. Which languages are NOT memory safe
C#
C++
C
Rust
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
Tones & Semitones 1a
Quiz
•
5th - 12th Grade
15 questions
Guess that Artist
Quiz
•
1st Grade - Professio...
10 questions
AWE 5 3rd Trim.Reviewer Quiz 1
Quiz
•
5th Grade
10 questions
THE MAGIC FLUTE
Quiz
•
2nd Grade
10 questions
Amplification du son
Quiz
•
KG - 9th Grade
15 questions
Greenhouse aflevering 5
Quiz
•
KG - 4th Grade
11 questions
Class 4 Science Safe handling of water
Quiz
•
4th Grade
10 questions
Pambansang Awit
Quiz
•
1st Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
