Secure Programming Practices - Quiz

  • AIdentifying all possible erroneous inputs, and managing how an application responds to them.
  • BCommercial runtime environments that contain tools to record debugging information from memory at the time of the exception, to provide 'root-cause' analysis information later.
  • CDuring application execution, if certain special conditions. met, a specific subroutine 'exception handler' is called.
  • DAll the above options
  • ANumber of roles
  • BNumber of lines of code
  • CSize of the attack surface
  • DSize of the chroot jail
  • AUser Access Control
  • BMandatory Access Control
  • CRole-based Access Control
  • DDiscretionary Access Control
  • AConfidentiality is a process to prevent unauthorized alteration of information.
  • BAuthorization validates user identity.
  • CAccountability is a process to prevent repudiation.
  • DNone of the above options is correct.
  • AWrite only certain areas using tokens
  • BRead certain memory areas using the %s token
  • CRead and write to memory at will
  • DAll the above options
  • AHidden variables must be used to remember the previous stage values, and current stage supplier credentials must be validated at the server end.
  • BCredentials given during the previous stage should be saved in a persistent cookie, and the current stage supplier credentials must be validated at the server end.
  • CThe application should validate the credentials supplied at each stage and the previous stages.
  • DThe application must validate the credentials given at each stage only
  • ATo secure the application
  • BIf none of the users have administrative access
  • CIf the passwords contain more than six characters
  • DOnly when combined with other controls
  • AFiltering data with a default deny regular expression
  • BClient-side data validation
  • CUsing parameterized queries to access a database
  • DRunning the application with least privileges