2027) Questions & Answers {Grade A}
100% Correct
What is tautology? - correct answer a statement that is true by definition
injects code in one or more conditional statements so that they always evaluate to true
(returns everything)
What is used to add additional queries beyond the intended query? - correct answer
piggyback/stacked queries
What does this command do?
wget purdue.edu - correct answer downloads the index.html page onto the machine
,What should secure coding do? - correct answer — input validation
— output encoding
— authentication & password management
— session management
— access control
— cryptographic practices
— error handling & logging
— data protection
— communication security
— database security
— file management
— memory management
— follow good general coding practices
,Where do the secure coding practices come from? - correct answer OWASP's Secure
Code Development (SCD) Guide
With secure coding, you should ____________ everything. - correct answer validate
The ___________ is protected memory space - correct answer kernel
TRUE/FALSE
When a value is stored in a location in memory, the system can use it as a meaningful
data value or instruction. - correct answer TRUE
What is this an example of?
char sample[10];
, int i;
for (i=0; i<=9; i++)
sample [i] = 'A';
sample[10] = 'B'; - correct answer buffer overflow
What is a buffer overflow? - correct answer when a program attempts to put more
data in a buffer than it can hold or when a program attempts to put data in a memory
area past a buffer
What are the results of a buffer overflow? - correct answer — execute arbitrary code
— crash a program
— corrupt data
— corrupt instructions
A ___________ is when a chunk of memory is allocated. - correct answer buffer