Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice Study Set 2
Quiz 11: Software Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
Question 22
Short Answer
The process of transforming input data that involves replacing alternate, equivalent encodings by one common value is called _________.
Question 23
Multiple Choice
__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser.
Question 24
Short Answer
In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
Question 25
Multiple Choice
A _______ attack is where the input includes code that is then executed by the attacked system.
Question 26
Short Answer
_________ attacks are most commonly seen in scripted Web applications.
Question 27
Short Answer
Program input data may be broadly classified as textual or ______.
Question 28
Multiple Choice
Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack.
Question 29
Multiple Choice
The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.
Question 30
Multiple Choice
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file, ensuring that each process has appropriate access in turn.