Secure software development Flashcards

1
Q

Black box testing

A

Occurs when a tester is not provided with any information about
the system or program prior to conducting the test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

White box testing

A

Occurs when a tester is provided full details of a system including
the source code, diagrams, and user credentials in order to
conduct the test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SEH

A

Structured Exception handling: provides control over what the application should do when faced with a
runtime or syntax error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Static analysis

A

Source code of an application is reviewed manually or with automatic
tools without running the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic analysis

A

Analysis and testing of a program occurs while it is being executed or run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fuzzing

A

Injection of randomized data into a software program in an attempt to
find system failures, memory leaks, error handling issues, and improper
input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RCE

A

Remote Code execution: Occurs when an attacker is able to execute or run commands
on a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Arbitrary code execution

A

Occurs when an attacker is able to execute or run commands
on a victim computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Directory traversal

A

Method of accessing unauthorized directories by moving through the
directory structure on a remote server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stack

A

Reserved area of memory where the program saves the return address when a function call instruction is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Smash the stack

A

Occurs when an attacker fills up the buffer with NOP so that the
return address may hit a NOP and continue on until it finds the
attacker’s code to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XSRF

A

Cross site request forgery: Occurs when an attacker forces a user to execute actions on a web server
for which they are already authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XML Bomb

A

XML encodes entities that expand to exponential sizes, consuming
memory on the host and potentially crashing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

XML external entity

A

An attack that embeds a request for a local resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Race conditions

A

A software vulnerability when the resulting outcome from execution processes is
directly dependent on the order and timing of certain events, and those events
fail to execute in the order and timing intended by the developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly