Secure Software Development Flashcards

1
Q

Occurs when a tester is not provided with any information about
the system or program prior to conducting the test

A

Black Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Occurs when a tester is provided full details of a system including
the source code, diagrams, and user credentials in order to
conduct the test

A

White Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides control over what the application should do when faced with a
runtime or syntax error

A

Structured Exception Handling(SEH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applications verify that information received from a user matches
a specific format or range of values

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Source code of an application is reviewed manually or with automatic
tools without running the code

A

Static Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

§ Analysis and testing of a program occurs while it is being executed or run

A

Dynamic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Injection of randomized data into a software program in an attempt to
find system failures, memory leaks, error handling issues, and improper
input validation

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code placed in computer programs to bypass normal authentication and
other security mechanisms

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Method of accessing unauthorized directories by moving through the
directory structure on a remote server

A

Directory Traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Occurs when an attacker is able to execute or run commands
on a victim computer

A

Arbitrary Code execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Occurs when an attacker is able to execute or run commands
on a remote computer

A

Remote Code Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack against a vulnerability that is unknown to the original developer or
manufacturer

A

Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Occurs when a process stores data outside the memory range allocated
by the developer

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

§ A temporary storage area that a program uses to store data

A

Buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reserved area of memory where the program saves the return
address when a function call instruction is received

A

Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when an attacker fills up the buffer with NOP so that the
return address may hit a NOP and continue on until it finds the
attacker’s code to run

A

“Smash the Stack”

17
Q

Method used by programmers to randomly arrange the different
address spaces used by a program or process to prevent buffer
overflow exploits

A

Address Space Layout Randomization

18
Q

Occurs when an attacker embeds malicious scripting commands on a
trusted website

A

Cross-Site Scripting(XSS)

19
Q

Occurs when an attacker forces a user to execute actions on a web server
for which they are already authenticated

A

Cross-Site Request Forgery(XSRF/CSRF)

20
Q

Attack consisting of the insertion or injection of an SQL query via input
data from the client to a web application

A

SQL Injection

21
Q

A software vulnerability when the resulting outcome from execution processes is
directly dependent on the order and timing of certain events, and those events
fail to execute in the order and timing intended by the developer

A

Race Conditions