BOOK: Ch 11, 12 Flashcards

1
Q

The process of designing and implementingsoftware so that it continues to function even when under attack. Software written using this process is able to detect erroneous conditions resulting fromsome attack, and to either continue executing safely, or to fail gracefully.

A

Defensive Programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This problem occurs when program input data can accidentally or deliberately influence the flow of execution of the program.

A

Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When the input is used in theconstruction of a command that is subsequently executed by the system with theprivileges of the Web server.

A

Command Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In this attack, the user-supplied input is used to construct a SQL request to retrieve informationfrom a database.

A

SQL Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a software testing technique that uses randomly generated data as inputs to a program. The intent is to determine whether the program or functioncorrectly handles all such abnormal inputs or whether it crashes or otherwise fails to respond appropriately.

A

Input Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This strongly suggests that programs should execute with the least amount of privileges needed to complete their function.

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A process that includes planning, installation, configuration, update, and maintenanceof the operating system and the key applications in use,

A

Hardening a System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Steps to hardening a base OS

A

• Removing unnecessary services, applications, and protocols.• Configuring users, groups, and permissions.• Configuring resource controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which restricts the server’s view of the file system to just a specified portion. Files in directoriesoutside the __________ are not visible or reachable at all.

A

Chroot Jail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refers to a technology that provides an abstraction of the computing resources used by some software, which thus runs in a simulated environmentcalled a virtual machine (VM).

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly