Quiz 5 - Application Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

t/f; ALL popular web browser software incorporated a standard structure and security foundation.

False

t/f; Default users accounts and permission are typically not a cause of Web Server Vulnerabilities

False

t/f; In the design of a secure software application, the validation of inputs is an optional activity?

False

t/f; Disabling or uninstalling unused, unnecessary, or untrusted add-ons or features is one of the ways you can avoid web browser vulnerabilities.

True

t/f; SQL injection attacks allow the attacker to delete, alter database information, and to create/add new information to the database.

True

t/f; a strong well-defines software application design and development life cycle is essential to the development of critical applications.

True

What type of Web application attack allows an attacker to alter and control the instruction sequence or a running process/program execution, and to modify internal application and system variables to execute malicious code that has been planted in memory?

Buffer Overflow Attack

Which of the fundamental characteristics of a secure software application requires that an application must ensure data and information processing is accurate to assure the integrity and reliability of the data?

Corecctness of Processing

What is the security protocol used to secure communications between a web server and a web client (browser) with symmetrical public key encryption?

Secure Socket Layer (SSL)

Which of the following types of vulnerabilities is not common to web browser software?

User data forms


Ensembles d'études connexes

Chapter 62: Management of Patients with Burn Injury

View Set

Fundamentals PrepU Chapter 28: Medications

View Set

Chapter 1- The Mathematics of Voting: Paradoxes of Democracy

View Set

Wrong questions from Guaranteed Exam

View Set

Media Law: FCC, FDA and FTC Regulation

View Set

AFSC 3F051 CDC Personnel Journeyman

View Set