Dev Flashcards

1
Q

What are the top three in the top 10 OWASP web application security risks.

A. Insecure Direct Object Reference
B. Cross-Site Request Forgery (CSRF)
C Cross-Site Scripting (XSS)
D. Injection
E. Sensitive Data exposure
F. Security Misconfiguration
G. Broken Authentication and Session Management
H. Using Components with Known Vulnerabilities
A

C, D, G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is the act of sending random data to the target program in order to trigger failures.

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Various levels of testing should be carried out during development. Which of following is not a testing type?

A. Acceptance
B. Regression
C. Aggregation
D. Integration
E. Unit
A

Acceptance testing = Ensuring code meets customer requirements

Regression testing = Testing after changes take place

Integration = verifying components work together in the production environment.

Unit = testing individual components. Mature developers develop unit tests for their modules before they even start coding or in parallel. Known as TEST-DRIVEN development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This type of programming provides modularity, reusabilty, and more granular control within the programs themselves compared to classical programming languages.

A

Object-oriented programming

OOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This type of XSS attack exploits the lack of proper input or output validation on dynamic websites.

A

nonpersistent XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This type of XSS attack is when a the attacker loads malicious code on a server that attacks visiting browsers.

A

persistent XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Category of programming language that is written in binary.

A

Machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A category of programming language that is not portable, is low-level, and is a symbolic representation of machine-level instructions

A

Assembly language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Converts assembly code to machine code.

A

Assemblers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Converts high-level language statements into the necessary machine-level format for specific processors to understand.

A

Compilers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the right kind of environment, this can perform the last step of transforming high-level code to machine-level code. Improves portability and handles memory management, but requires that the ___________ be installed on the local machine.

A

interpreter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Heuristic detection approaches in antimalware products include static analysis and dynamic analysis where an AV allows a piece of the suspected code to run in a sandbox or virtual machine, sometimes called an ____________ .

A

emulation buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of virus hides the modifications it has made to files or boot records. It can use tunneling tactics or other tactics to hide it’s footprint and activities.

A

Stealth virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This type of virus produces varied but operational copies of itself in an attempt to defeat virus scans.

A

Polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Object-Oriented programming (OOP) works with classes and objects. Table, chair, couch are objects of the class furniture. The class has a set of attributes, like color, dimension, weight, style, and cost. The attributes apply to all object members in the class. This is also called _____________.

A

instantiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software written in OOP has requests sent to it, usually from another object, which creates another object to carry out some sort of functionality. The object can even be indifferent programming languages as long as the requesting object knows the API.

A

Just FYI

17
Q

In OOP, this is the functionality or procedure an object can carry out

A

method

18
Q

Objects ____________ the attribute values, which means this information is packaged under one name and can be reused as one entity by other objects

A

encapsulate

19
Q

This is also what encapsulation provides in OOP. Objects can have a “shared” portion which is the API. The “private” portion of how it actually works.

A

data hiding

20
Q

If a module carries out only one task or tasks that are very similar it is said to have high _________ . This is good because it’ll be easier to update or modify without affecting other modules.

A

cohesion

21
Q

This is a measurement that indicates how much interaction one module requires to carry out its tasks. The lower the better… lower meaning it does not need to communicate with many other modules.

A

coupling

22
Q

This manages communication between objects and enables them to interact in a heterogeneous and distributed environment.

A. Component Object Model (COM)
B. Object request broker (ORB)
C. Object Linking and embedding (OLE)
D. Common Object Request Broker Architecture (CORBA)

A

Object request broker (ORB)

23
Q

This provides a standardized way for objects within different applications, platforms, and environments to communicate. It accomplishes this by providing standards for interfaces between objects.

A. Component Object Model (COM)
B. Object request broker (ORB)
C. Object Linking and embedding (OLE)
D. Common Object Request Broker Architecture (CORBA)

A

Common Object Request Broker Architecture (CORBA)

24
Q

This provides an architecture for components to interact on a local system. The distributed version uses the same interfaces, but enables components to interact over a distributed, or networked, environment.

A. Component Object Model (COM)
B. Object request broker (ORB)
C. Object Linking and embedding (OLE)
D. Common Object Request Broker Architecture (CORBA)

A

Component Object Model (COM)

DCOM = Distributed COM

25
Q

Enables a program to call another program (linking) and permits a piece of data to be inserted inside another program or document (embedding).

A. Component Object Model (COM)
B. Object request broker (ORB)
C. Object Linking and embedding (OLE)
D. Common Object Request Broker Architecture (CORBA)

A

Object Linking and embedding (OLE)