Secure Coding & Testing | Test-3

0%
0

Secure Coding & Testing | Test-3

In this section, we delve into the principles and practices of secure coding and rigorous testing methodologies designed to fortify software against vulnerabilities. We cover strategies for writing code that adheres to security best practices, including input validation, proper error handling, and secure authentication mechanisms. Additionally, we explore various testing techniques such as static analysis, dynamic testing, and penetration testing to identify and mitigate potential security threats. By integrating secure coding practices with comprehensive testing, this section aims to ensure robust, resilient software that safeguards against potential attacks and maintains the integrity of sensitive data.

1 / 27

1. What does CVE stands for?

2 / 27

2. Why is it recommended to explicitly initialize all variables and other data stores, either during declaration or just before the first usage in secure coding practices?

3 / 27

3. What is the BEST time to perform Static Code analysis (SAST) among the following?

4 / 27

4. What is a critical factor in the success of continuous testing within a CI/CD pipeline?

5 / 27

5. How do you prevent Race conditions from occurring?

6 / 27

6. Which programming design pattern is commonly used to address input validation and prevent common security vulnerabilities?

7 / 27

7. Which of the following types of security testing tools uses disassembly and pattern recognition to find vulnerabilities?

8 / 27

8. Which of the following has the LOWEST likelihood of being found through a code review procedure via automated tools?

9 / 27

9. What is CWE?

10 / 27

10. Maintaining the security and integrity of the build environment and tools is essential to guard against

11 / 27

11. Programmers often find it difficult to determine what kinds of security should be included in the software they develop. The risks, threats, and vulnerabilities that come with developing software can sometimes seem never-ending.

Which of the following BEST sums up what developers should do as their initial step in determining which security measures to include in a software project?

12 / 27

12. The best way to counteract impersonation attacks, like Man-in-the-Middle (MITM) attacks in an Internet application, is to use appropriate

13 / 27

13. One way to combat ________ is to use the CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) protection.

14 / 27

14. Generally, penetration testing is carried out with a clearly defined _______________

15 / 27

15. How does a programmer prevent Java script on the browser from accessing a cookie?

16 / 27

16. Which security testing technique involves actively simulating attacks on a system to identify vulnerabilities?

17 / 27

17. Allowing disassemblers, debuggers and de-compilers to identify the vulnerabilities in the source code is due to?

18 / 27

18. Why is it recommended to raise execution privileges as late as possible and drop them as soon as possible when the application must run with elevated privileges?

19 / 27

19. Why is it recommended not to pass user-supplied data to any dynamic execution function in secure programming practices?

20 / 27

20. Why is it RECOMMENDED to use only trusted system objects, such as server-side session objects, for making access authorization decisions in secure software development?

21 / 27

21. Why is it RECOMMENDED to enforce authorization controls on every request, including those made by server-side scripts?

22 / 27

22. Which security practice is RECOMMENDED to enforce access restrictions for authorized users for various components?

23 / 27

23. Why is it recommended to limit the number of transactions a single user or device can perform in a given period of time?

24 / 27

24. Why is it recommended to periodically re-validate a user’s authorization and force re-authentication in a system allowing long authenticated sessions?

25 / 27

25. Why is it recommended to generate all random numbers, random file names, random GUIDs, and random strings using the cryptographic moduleโ€™s approved random number generator?

26 / 27

26. Why is it IMPORTANT to test segregation of duties for all roles in the application during secure software testing?

27 / 27

27. When simulating a production environment for security testing, what is a key consideration to ensure the effectiveness of the simulation?

Your score is

The average score is 0%

0%


Related challenges :