Software Development Security Flashcards
What is the value of the logical operation shown here?
X: 0 1 1 0 1 0Y: 0 0 1 1 0 1___________________________X ? Y: ?
A) 0 1 1 1 1 1
B) 0 1 1 0 1 0
C) 0 0 1 0 0 0
D) 0 0 1 1 0 1
0 1 1 1 1 1
The ? OR symbol represents the OR function, which is true when one or both of the input bits are true.
In systems utilizing a ring protection scheme, at what level does the security kernel reside? A) Level 0 B) Level 1 C) Level 2 D) Level 3
Level 0
The security kernel and reference monitor reside at Level 0 in the ring protection scheme, where they have unrestricted access to all system resources.
Which one of the following terms cannot be used to describe the main RAM of a typical computer system? A) Volatile B) Sequential access C) Real memory D) Primary memory
Sequential access
Random access memory (RAM) allows for the direct addressing of any point within the resource. A sequential access storage medium, such as a magnetic tape, requires scanning through the entire media from the beginning to reach a specific address.
What condition is necessary on a web page for it to be used in a cross-site scripting attack? A) Reflected input B) Database-driven content C) .NET technology D) CGI scripts
Reflected input
Cross-site scripting attacks are successful only against web applications that include reflected input.
What form of access control is concerned primarily with the data stored by a field? A) Content-dependent B) Context-dependent C) Semantic integrity mechanisms D) Perturbation
Content-dependent
Content-dependent access control is focused on the internal data of each field.
What HTML tag is often used as part of a cross-site scripting (XSS) attack? A) B) C) D)
What character should always be treated carefully when encountered as user input on a web form? A) ! B) & C) * D) '
’
The single quote character (‘) is used in SQL queries and must be handled carefully on web forms to protect against SQL injection attacks.
What type of reconnaissance attack provides attackers with useful information about the services running on a system? A) Session hijacking B) Port scan C) Dumpster diving D) IP sweep
Port scan
Port scans reveal the ports associated with services running on a machine and available to the public.
What technology does the Java language use to minimize the threat posed by applets? A) Confidentiality B) Encryption C) Stealth D) Sandbox
Sandbox
The Java sandbox isolates applets and allows them to run within a protected environment, limiting the effect they may have on the rest of the system.
What is the most effective defense against cross-site scripting attacks? A) Limiting account privileges B) Input validation C) User authentication D) Encryption
Input validation
Input validation prevents cross-site scripting attacks by limiting user input to a predefined range. This prevents the attacker from including the HTML
What type of virus utilizes more than one propagation technique to maximize the number of penetrated systems? A) Stealth virus B) Companion virus C) Polymorphic virus D) Multipartite virus
Multipartite virus
Multipartite viruses use two or more propagation techniques (for example, file infection and boot sector infection) to maximize their reach.
What programming language(s) can be used to develop ActiveX controls for use on an Internet site? A) Visual Basic B) C C) Java D) All of these are correct.
All of these are correct
Microsoft’s ActiveX technology supports a number of programming languages, including Visual Basic, C, C++, and Java. On the other hand, only the Java language can be used to write Java applets.
What transaction management principle ensures that two transactions do not interfere with each other as they operate on the same data? A) Atomicity B) Consistency C) Isolation D) Durability
Isolation
The isolation principle states that two transactions operating on the same data must be temporarily separated from each other such that one does not interfere with the other.
In what type of software testing does the tester have access to the underlying source code? A) Static testing B) Dynamic testing C) Cross-site scripting testing D) Black box testing
Static testing
In order to conduct a static test, the tester must have access to the underlying source code.
What portion of the change management process allows developers to prioritize tasks? A) Release control B) Configuration control C) Request control D) Change audit
Request control
The request control provides users with a framework to request changes and developers with the opportunity to prioritize those requests.