Quiz 5 - Application Security
t/f; ALL popular web browser software incorporated a standard structure and security foundation.
False
t/f; Default users accounts and permission are typically not a cause of Web Server Vulnerabilities
False
t/f; In the design of a secure software application, the validation of inputs is an optional activity?
False
t/f; Disabling or uninstalling unused, unnecessary, or untrusted add-ons or features is one of the ways you can avoid web browser vulnerabilities.
True
t/f; SQL injection attacks allow the attacker to delete, alter database information, and to create/add new information to the database.
True
t/f; a strong well-defines software application design and development life cycle is essential to the development of critical applications.
True
What type of Web application attack allows an attacker to alter and control the instruction sequence or a running process/program execution, and to modify internal application and system variables to execute malicious code that has been planted in memory?
Buffer Overflow Attack
Which of the fundamental characteristics of a secure software application requires that an application must ensure data and information processing is accurate to assure the integrity and reliability of the data?
Corecctness of Processing
What is the security protocol used to secure communications between a web server and a web client (browser) with symmetrical public key encryption?
Secure Socket Layer (SSL)
Which of the following types of vulnerabilities is not common to web browser software?
User data forms