Application Security Quiz Flashcards

1
Q

Which of the programming aspects listed below are critical in the secure application development process? (Select 2 answers)

A) Patch management
B) Input validation
C) Password protection
D) Error and exception handling
E)Application whitelisting

A

B) Input validation

D) Error and exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A situation in which a web form field accepts data other than expected (e.g., server commands) is an example of:

A) Zero-day vulnerability
B) Improper input validation
C) Default configuration
D) Improper error handling

A

B) Improper input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a countermeasure against code injection?

A) Fuzzing
B) Input validation
C) Code signing
D) Normalization

A

B) Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the terms listed below refers to an automated or manual code review process aimed at discovering logic and syntax errors in the application’s source code?

A) Input validation
B) Dynamic code analysis
C) Fuzzing
D) Static code analysis

A

D) Static code analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The term “Secure cookie” refers to a type of HTTP cookie that is transmitted over an encrypted HTTPS connection, which helps prevent the cookie from being intercepted or tampered with during transit.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A dynamic code analysis allows for detecting application flaws without the need for actual execution of the application code.

A) True
B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The term “Static code analysis” refers to the process of discovering application runtime errors.

A) True
B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of code signing? (Select 2 answers)

A) Disables code reuse

B) Confirms the application’s source of origin

C) Enables application installation

D) Validates the application’s integrity

E) Protects the application against unauthorized use

A

D) Validates the application’s integrity

B) Confirms the application’s source of origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The practice of finding vulnerabilities in an application by feeding it incorrect input is called:

A) Normalization
B) Hardening
C) Dynamic code analysis
D) Fuzzing

A

D) Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as:

A) Sideloading
B) Virtualization
C) Sandboxing
D) Stress testing

A

C) Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to a Windows-specific feature for handling exceptions, errors, and abnormal conditions in software?

A) EPC
B) SEH
C) EH
D) EXR

A

B) SEH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Address Space Layout Randomization (ASLR) is an OS security technique that randomizes the location of key data areas in memory. The purpose of ASLR is to prevent attackers from predicting the location of specific code or data in memory, which adds a layer of defense against memory-based attacks, such as buffer overflows.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as:

A) MFA
B) CAPTCHA
C) SSO
D) NIDS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly