Dev Flashcards
What are the top three in the top 10 OWASP web application security risks.
A. Insecure Direct Object Reference B. Cross-Site Request Forgery (CSRF) C Cross-Site Scripting (XSS) D. Injection E. Sensitive Data exposure F. Security Misconfiguration G. Broken Authentication and Session Management H. Using Components with Known Vulnerabilities
C, D, G
This is the act of sending random data to the target program in order to trigger failures.
Fuzzing
Various levels of testing should be carried out during development. Which of following is not a testing type?
A. Acceptance B. Regression C. Aggregation D. Integration E. Unit
Acceptance testing = Ensuring code meets customer requirements
Regression testing = Testing after changes take place
Integration = verifying components work together in the production environment.
Unit = testing individual components. Mature developers develop unit tests for their modules before they even start coding or in parallel. Known as TEST-DRIVEN development.
This type of programming provides modularity, reusabilty, and more granular control within the programs themselves compared to classical programming languages.
Object-oriented programming
OOP
This type of XSS attack exploits the lack of proper input or output validation on dynamic websites.
nonpersistent XSS
This type of XSS attack is when a the attacker loads malicious code on a server that attacks visiting browsers.
persistent XSS
Category of programming language that is written in binary.
Machine language
A category of programming language that is not portable, is low-level, and is a symbolic representation of machine-level instructions
Assembly language
Converts assembly code to machine code.
Assemblers
Converts high-level language statements into the necessary machine-level format for specific processors to understand.
Compilers
In the right kind of environment, this can perform the last step of transforming high-level code to machine-level code. Improves portability and handles memory management, but requires that the ___________ be installed on the local machine.
interpreter
Heuristic detection approaches in antimalware products include static analysis and dynamic analysis where an AV allows a piece of the suspected code to run in a sandbox or virtual machine, sometimes called an ____________ .
emulation buffer
This type of virus hides the modifications it has made to files or boot records. It can use tunneling tactics or other tactics to hide it’s footprint and activities.
Stealth virus
This type of virus produces varied but operational copies of itself in an attempt to defeat virus scans.
Polymorphic virus
Object-Oriented programming (OOP) works with classes and objects. Table, chair, couch are objects of the class furniture. The class has a set of attributes, like color, dimension, weight, style, and cost. The attributes apply to all object members in the class. This is also called _____________.
instantiated