Chapters 11, 12 Flashcards

1
Q

The process of designing and implementing
software so that it continues to function even when under attack. Software written using this process is able to detect erroneous conditions resulting from
some attack, and to either continue executing safely, or to fail gracefully.

A

Defensive Programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This problem occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

A

Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When the input is used in the
construction of a command that is subsequently executed by the system with the
privileges of the Web server.

A

Command Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In this attack, the user-supplied input is used to construct a SQL request to retrieve information
from a database.

A

SQL Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a software testing technique that uses randomly generated data as inputs to a program. The intent is to determine whether the program or function
correctly handles all such abnormal inputs or whether it crashes or otherwise fails to respond appropriately.

A

Input Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This strongly suggests that programs should execute with the least amount of privileges needed to complete their function.

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A process that includes planning, installation, configuration, update, and maintenance
of the operating system and the key applications in use,

A

Hardening a System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Steps to hardening a base OS

A
  • Removing unnecessary services, applications, and protocols.
  • Configuring users, groups, and permissions.
  • Configuring resource controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which restricts the server’s view of the file system to just a specified portion. Files in directories
outside the __________ are not visible or reachable at all.

A

Chroot Jail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refers to a technology that provides an abstraction of the computing resources used by some software, which thus runs in a simulated environment
called a virtual machine (VM).

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly