Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice Study Set 1
Quiz 11: Software Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Essay
A number of widely used standard C _________ compound the problem of buffer overflow by not providing any means of limiting the amount of data transferred to the space available in the buffer.
Question 22
Essay
__________ programming is a form of design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of the software.
Question 23
Multiple Choice
The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately.
Question 24
Essay
Program _______ refers to any source of data that originates outside the program and whose value is not explicitly known by the programmer when the code was written.
Question 25
Multiple Choice
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.
Question 26
Multiple Choice
A ________ is a pattern composed of a sequence of characters that describe allowable input variants.
Question 27
Multiple Choice
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file,ensuring that each process has appropriate access in turn.