Computers, Instructional Technology, Professional Development

University

Image

Secure Programming Practices

11
plays

23 questions

Show Answers
See Preview
  • 1. Multiple Choice
    45 seconds
    1 pt

    Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?

    All the above options

    Read and write to memory at will  

    Write only certain areas using tokens

    Read certain memory areas using the %s token

  • 2. Multiple Choice
    30 seconds
    1 pt

    Setting the cookie flag to which of the following mode is a good programming practice?

    Protected

    Secure

    Locked

    Safe

  • 3. Multiple Choice
    45 seconds
    1 pt

    Identify the correct statement in the following:

    B) Customer trust, reputation, financial, compliance, and privacy are the major reasons to implement a software security program.

    C) To secure online data, build secure software.

    A) Security is a technical problem and is the responsibility of the security manager.

    D) All the above options  

    E) A) and C)  

  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?