Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Which are the most common exploit used to hack into a system? |
|
Definition
|
|
Term
| The spiral model is characterized by iterative development, where requirements and solutions evolve through an ongoing collaboration between self-organizing, cross-functional teams. |
|
Definition
|
|
Term
| What is used to compare program responses to known inputs and comparison of the output to desired output? |
|
Definition
|
|
Term
| The Terms RC4 and 3DES refer to |
|
Definition
| Encryption algorithms used to encrypt data |
|
|
Term
| Inlining is using an embedded control from another site, with or without the other site's permission. |
|
Definition
|
|
Term
| In the secure development lifecycle, employing use cases to compare program responses to known inputs, and then comparing the outputs to the desired outputs should take place in which phase? |
|
Definition
|
|
Term
| Lease privilege refers to removing all controls from a system. |
|
Definition
|
|
Term
| Which of the following in a browser guarantees perfect security? |
|
Definition
| There is no guarantee of perfect security. |
|
|
Term
| Errors found after development is complete are expensive. |
|
Definition
|
|
Term
| Fuzzing is a powerful tool used in testing code. |
|
Definition
|
|
Term
| Unvalidated input that changes the code functioning in an unintended way is which type of coding error? |
|
Definition
|
|
Term
| With the RSA and Diffie-Hellman handshakes |
|
Definition
| Parameters are agreed upon and certificates and keys are exchanged. |
|
|
Term
| FTP encrypts traffic by default. |
|
Definition
|
|
Term
| Generating true random numbers is a fairly trivial task. |
|
Definition
|
|
Term
| What is the waterfall model characterized by? |
|
Definition
| c. A linear, multistep process |
|
|
Term
| Authenticode is used to encrypt program code so that it is more difficult for hackers to reverse engineer it. |
|
Definition
|
|
Term
| Which of the following do not enhance the security of the browser? |
|
Definition
|
|
Term
| Scoring the efforts to reduce the effects of threats occurs in which step of threat modeling? |
|
Definition
| Step 9-Determine and score mitigation |
|
|
Term
| Which is a 100% secure method to download applications from the Internet? |
|
Definition
|
|
Term
| CVE provides security personnel with a common language to use when discussing vulnerabilities. |
|
Definition
|
|
Term
| Using SSL protects your data from interception by devices such as key loggers. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| When the function of code is changed in an unintended way, it is an example of code injection. |
|
Definition
|
|
Term
| Which is related to a code injection error? |
|
Definition
|
|
Term
| One way a user can feel confident that the code they are downloading is from a legitimate vendor and has not been modified is with the implementation of |
|
Definition
|
|
Term
|
Definition
| a. A collection of APIs, protocols, and programs developed by Microsoft to automatically download and execute code over the Internet |
|
|
Term
| The Open Vulnerability and Assessment Language (OVAL) ___________. |
|
Definition
| Is an XML framework for describing vulnerabilities |
|
|
Term
| Creating a graphical representation of the required elements for an attack vector occurs in which step of Threat Modeling? |
|
Definition
| Step 8-Create threat trees |
|
|
Term
| What is the one item that could labeled as the "most wanted" item in coding security? |
|
Definition
|
|
Term
| Common Gateway Interface (CGI) security issues include |
|
Definition
| a. Poorly configured CGIs can crash when users input unexpected data. |
|
|
Term
| In the secure development lifecycle, in which phase should minimizing the attack surface area take place? |
|
Definition
|
|
Term
| The specific security needs of a program being developed should be defined in the design phase of the secure development lifecycle. |
|
Definition
|
|