Secure Programming Practices - Quiz

  • AInsecure, because vendors do not test them.
  • BSecure, because of encryption.
  • CUnsafe, because they rely on security by obscurity.
  • DSafe, because buffer overflows cannot be effectively determined by random submission of data.
  • AFile permissions are not set appropriately
  • BThe existence of the file exceeds three seconds
  • CSpecial characters indicating a system file are not used in the filename
  • DSpecial characters are not used in the filename to hide the file
  • ANumber of roles
  • BNumber of lines of code
  • CSize of the attack surface
  • DSize of the chroot jail
  • ABusiness workflow
  • BRole-based access
  • CAuthorization on each request
  • DAll the above options
  • AA) Enabling all compiler warnings, and paying attention to these warnings
  • BB) Writing code for large projects.F) None of the above optionsD) Adding debug traces to code.
  • CC) Checking all pointer against null(0) values before using them.
  • DE) A) and C)
  • AAllow the use of HIDDEN form fields
  • BClean and validate all user input
  • CUse GET instead of POST
  • DTrust user-supplied data
  • ATo secure the application
  • BIf none of the users have administrative access
  • CIf the passwords contain more than six characters
  • DOnly when combined with other controls
  • AFiltering data with a default deny regular expression
  • BClient-side data validation
  • CUsing parameterized queries to access a database
  • DRunning the application with least privileges