Domain 8 Software Development Flashcards
What database technology, if implemented for web forms, can limit the potential for SQL injection? A) Triggers B) Stored procedures C) Column encryption D) Concurrency control
B) Stored procedures
What condition is necessary on a web page for it to be used in a cross-site scripting attack? A) Reflected input B) Database-driven content C) .NET technology D) CGI scripts
A) Reflected input
What technology does the JAVA language use to minimize the threat posed by applets? A) Confidentiality B) Encryption C) Stealth D) Sandbox
D) Sandbox
When designing an object-oriented model, which of the following situations is ideal? A) High cohesion, high coupling B) High cohesion, low coupling C) Low cohesion, low coupling D) Low cohesion, high coupling
B) Coupling is a description of the level of interaction between objects. Cohesion is the strength of the relationship between the purposes of methods within the same class. When you are developing an object-oriented model, it is desirable to have high cohesion and low coupling
Which of the following is a common way that attackers leverage botnets? A) Sending spam messages B) Conducting brute-force attacks C) Scanning for vulnerable systems D) All of the above
D) Botnets are used for a wide variety of malicious purpose, including scanning the network for vulnerable systems, conducting brute-force attacks against other systems, and sending out spam messages
Which one of the following statements is not true about code review?
A) Code review should be a peer-driven process that includes multiple developers
B) Code review may be automated
C) Code review occurs during the design phase
D) Code reviewers may expect to review several hundred lines of code per hour
C) Code review takes place after code has been developed, which occurs after the design phase of the system’s development life cycle (SDLC). Code review may use a combination of manual and automated techniques , or rely solely on one or the other. IT should be a peer-driven process that includes developers who did not write the code. Developers should expect to complete the review of around 300 lines per hour, on average.
Which process is responsible for ensuring that changes to software include acceptance testing? A) Request control B) Change control C) Release control D) Configuration control
C) One of the responsibilities of the release control process is ensuring that the process includes acceptance testing that confirms that any alterations to end-user work tasks are understood and functional prior to code release. Te request control, change control, and configuration control processes do not include acceptance testing.
Which one of the following is not a goal of software threat modeling?
A) To reduce the number of security-related design flaws
B) To reduce the number of security-related coding flaws
C) To reduce the severity of non-security related flaws
D)To reduce the number of threat vectors
D) Software threat modeling is designed to reduce the number of security-related design and coding flaws as well as the severity of other flaws.The developer or evaluator of software has no control over the threat environment, because it is external to the organization
What is a method in databases?
Object methods, also known as subprograms, are functions or procedures that you can declare in an object type definition to implement behavior that you want objects of that type to perform (the verb of the object)
Which one of the following is considered primary storage? A) Memory B) Hard disk C) Flash drive D) DVD
A) Primary storage is a technical term used to refer to the memory that is directly available to the CPU. Nonvolatile storage mechanisms, such as flash drives, DVDs, and hard drives, are classified as secondary storage.
Bobby is investigating how an authorized database user is gaining access to information outside his normal clearance level. Bobby believes that the user is making use of a type of function that summarizes data. What term describes this type of function? A) Inference B) Polymorphic C) Aggregate D) Modular
C) Aggregate functions summarize large amounts of data and provide only summary information as a result. When carefully crafted, aggregate functions may unintentionally reveal sensitive information.
Carrie is analyzing the application logs for her web-based application and comes across the following string:
../../../../../../../../../etc./passwd
What type of attack was likely attempted against Carrie’s application?
A) Command injection
B) Session hijacking
C) Directory Transversal
D) Bruteforce
C) The string shown in the logs is characteristic of a directory transversal attack where the attacker attempts to force the web application to navigate up the file that should not normally be provided to a web user, such as password file.
What term is used to describe the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its life cycle, and that the software functions in the intended manner?
A) Validation
B) Accredidation
C) Confidence interval
D) Assurance
Assurance, when it comes to software is the level of confidence that software is free from vulnerabilities s, either intentionally designed into the software or accidentally inserted at any time during its life cycle, and that the software functions in the intended manner. It is a term typically used in military and defense environments.
Referring to the database transaction shown here, what would happen if no account exists in the accounts table with account number 1001?
“BEGIN TRANSACTION
UPDATE accounts
SET balance= balance +250
WHERE Account_number=1001
Update accounts
SET balance = balance - 250
WHERE account_number=2002;
END TRANSACTION
A) The database would create a new account with this account number and give it a $250 balance
B) The database would ignore that command and still reduce the balance of the second account by $250
C) The database would roll back the transaction, ignoring the results of both commands.
D) The database would generate an error messgae.
B) In this example, the two SQL commands are indeed bundled in a transaction, but it is not an error to issue an update command that does not match any rows. Therefore, the first command would “succeed” in updating zero rows and not generate an error or cause the transaction to roll back. The second command would then execute, reducing the balance of the second account by $250 .
What was the likely motivation of the user who posted the message on the forum containing cross-site scripting code?
A) Reconnaissance
B) Theft of sensitive information
C) Credential stealing
D) Social engineering
A) The script that Linda discovered merely pops up a message on a user’s screen and does not perform any more malicious action. This type of script using an alert() call, is commonly used to probe websites for cross-site scripting vulnerabilities.