Chapter 11 Flashcards

1
Q

Defensive or Secure Programming

A

the process of designing and implementing software so that it continues to function even when under attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

injection attack

A

wide variety of program flaws related to invalid handling of input data

This problem occurs when program input data can accidentally or deliberately influence the flow of execution of the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

command injection

A

the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQL injection

A

The user-supplied input is used to construct a SQL request to retrieve information from a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

code injection

A

the input includes code that is then executed by the attacked system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cross-site scripting (XSS) attacks

A

concerns input provided to a program by one user that is subsequently output to another user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XSS reflection vulnerability

A

The attacker includes the malicious script content in data supplied to a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly